Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Upload versus Download Cost for Secure and Private Matrix Multiplication., and . ITW, page 1-5. IEEE, (2019)On Secure Topological Interference Management for Half-rate-feasible Networks., and . ICC, page 1-6. IEEE, (2020)Privacy Amplification for Federated Learning via User Sampling and Wireless Aggregation., , and . ISIT, page 2732-2737. IEEE, (2021)MAC Aware Quantization for Distributed Gradient Descent., and . GLOBECOM, page 1-6. IEEE, (2020)Differentially Private Community Detection for Stochastic Block Models., , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 15858-15894. PMLR, (2022)Interference Channels with Confidential Messages: Scaling up the Secure Degrees of Freedom with No CSIT., and . ACSSC, page 1704-1708. IEEE, (2018)Interference Channels with Confidential Messages: Leveraging OFDM Transmission to Scale up Secure Degrees of Freedom with No CSIT., and . ISIT, page 747-751. IEEE, (2019)Latent-variable Private Information Retrieval., , , and . ISIT, page 1071-1076. IEEE, (2020)Aggregation-based location privacy: An information theoretic approach., , , , , and . Comput. Secur., (2020)Generalization Bounds for Neural Belief Propagation Decoders., , , , and . ISIT, page 596-601. IEEE, (2023)