Author of the publication

Algorithmic Detection of Adversarial Attacks on Message Transmission and ACK/NACK Feedback.

, , and . ICC, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination., , and . Entropy, 19 (7): 349 (2017)Secure Lossy Function Computation with Multiple Private Remote Source Observations., , and . IACR Cryptol. ePrint Arch., (2022)Secure Lossy Function Computation with Multiple Private Remote Source Observations., , and . WSA, page 1-6. VDE Berlag / IEEE, (2021)Finite-blocklength bounds for wiretap channels., , and . ISIT, page 3087-3091. IEEE, (2016)On MMSE properties of optimal codes for the Gaussian wiretap channel., , , and . ITW, page 1-5. IEEE, (2015)An I-MMSE based graphical representation of rate and equivocation for the Gaussian broadcast channel., , , and . CNS, page 53-58. IEEE, (2015)The multiple-access channel with an external eavesdropper: Trusted vs. untrusted users., , and . ACSSC, page 564-568. IEEE, (2015)Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage., , , , and . ISITA, page 475-479. IEEE, (2020)On ergodic fading Gaussian interference channels with statistical CSIT., , and . ITW, page 454-458. IEEE, (2016)The secrecy capacity of a compound MIMO Gaussian channel., and . ITW, page 1-5. IEEE, (2013)