Author of the publication

Identification Capacity of Correlation-Assisted Discrete Memoryless Channels: Analytical Properties and Representations.

, , and . ISIT, page 470-474. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum Broadcast Channels with Cooperating Decoders: An Information-Theoretic Perspective on Quantum Repeaters., , and . CoRR, (2020)Robust Online Mirror Saddle-Point Method for Constrained Resource Allocation., and . ICASSP, page 4970-4974. IEEE, (2020)Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs., and . IEEE Trans. Inf. Theory, 67 (1): 52-80 (2021)Optimization of matrix monotone functions: saddle-point, worst case noise analysis, and applications., and . ISIT, page 62. IEEE, (2004)Delay-limited capacity and maximum throughput of spatially correlated multiple antenna systems under average and peak-power constraints., , and . ITW, page 440-445. IEEE, (2004)Information theoretic approach to the Perron root of nonnegative irreducible matrices., and . ITW, page 254-259. IEEE, (2004)The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel., , and . WIFS, page 1-7. IEEE, (2018)Coding for Non-IID Sources and Channels: Entropic Approximations and a Question of Ahlswede., , and . ITW, page 1-5. IEEE, (2019)Sensing-Assisted Receivers for Resilient-By-Design 6G MU-MIMO Uplink., , , and . JC&S, page 1-6. IEEE, (2023)Statistical verification of upper and lower bounds for the security performance of wiretap channels., , , and . WCNC, page 1-6. IEEE, (2023)