Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capacity-Achieving Private Information Retrieval Codes from MDS-Coded Databases with Minimum Message Size., , , and . ISIT, page 370-374. IEEE, (2019)Cost-Aware Learning and Optimization for Opportunistic Spectrum Access., , , and . IEEE Trans. Cogn. Commun. Netw., 5 (1): 15-27 (2019)Provably Fast Convergence of Independent Natural Policy Gradient for Markov Potential Games., , , , and . CoRR, (2023)Computational Techniques for Investigating Information Theoretic Limits of Information Systems., , , and . Inf., 12 (2): 82 (2021)Individually Conditional Individual Mutual Information Bound on Generalization Error., , and . IEEE Trans. Inf. Theory, 68 (5): 3304-3316 (2022)A Cascading Bandit Approach To Efficient Mobility Management In Ultra-Dense Networks., , , and . MLSP, page 1-6. IEEE, (2019)Harnessing the Power of Federated Learning in Federated Contextual Bandits., , , and . CoRR, (2023)Exactly Tight Information-Theoretic Generalization Error Bound for the Quadratic Gaussian Problem., , and . IEEE J. Sel. Areas Inf. Theory, (2024)Generalized Global Bandit and Its Application in Cellular Coverage Optimization., , , and . IEEE J. Sel. Top. Signal Process., 12 (1): 218-232 (2018)Weakly Private Information Retrieval from Heterogeneously Trusted Servers., , , and . CoRR, (2024)