Author of the publication

On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys.

, , , and . ISITA, page 663-667. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Sexually Harassing Tweets in Hindi Using Deep Learning Methods., , , , , , and . Int. J. Softw. Innov., 10 (1): 1-15 (2022)Matryoshka Representation Learning., , , , , , , , , and 1 other author(s). NeurIPS, (2022)Node-Level Differentially Private Graph Neural Networks., , , , , and . CoRR, (2021)Matryoshka Representations for Adaptive Deployment., , , , , , , , , and 1 other author(s). CoRR, (2022)IGLU: Efficient GCN Training via Lazy Updates., , , , and . CoRR, (2021)S3GC: Scalable Self-Supervised Graph Clustering., , , and . NeurIPS, (2022)Algorithm for Concept Traversal in Multiple Databases., and . ICTAI, page 370-374. IEEE Computer Society, (2009)Vikriti-ID: A Novel Approach For Real Looking Fingerprint Data-set Generation., , , and . WACV, page 6383-6391. IEEE, (2024)Review of image processing approaches for detecting plant diseases., and . IET Image Process., 14 (8): 1427-1439 (2020)ChildFace: Gender Aware Child Face Aging., , and . BIOSIG, volume P-306 of LNI, page 255-263. Gesellschaft für Informatik e.V., (2020)