From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Capacity-Achieving PIR Protocol for Distributed Storage Using an Arbitrary Linear Code., , , и . CoRR, (2018)Weak flip codes and applications to optimal code design on the binary erasure channel., , и . Allerton Conference, стр. 160-167. IEEE, (2012)The asymptotic capacity of noncoherent single-input multiple-output fading channels with memory and feedback., , и . ISIT, стр. 2269-2273. IEEE, (2013)Private Polynomial Computation for Noncolluding Coded Databases., , , и . ISIT, стр. 1677-1681. IEEE, (2019)Ultra-small block-codes for binary discrete memoryless channels., , и . ITW, стр. 175-179. IEEE, (2011)Optimal Byzantine attack for distributed inference with M-ary quantized data., , , и . ISIT, стр. 2474-2478. IEEE, (2016)Nonlinear codes outperform the best linear codes on the binary erasure channel., , и . ISIT, стр. 1751-1755. IEEE, (2015)On the Capacity of Private Nonlinear Computation for Replicated Databases., , , и . ITW, стр. 1-5. IEEE, (2019)Straggler-Resilient Differentially-Private Decentralized Learning., , , , и . ITW, стр. 708-713. IEEE, (2022)Single-Server Pliable Private Information Retrieval With Side Information., , и . ISIT, стр. 1526-1531. IEEE, (2023)