Author of the publication

Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States.

, , , , and . CIT, page 263-269. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wiretap Channel with Information Embedding on Actions., and . Entropy, 16 (4): 2105-2130 (2014)An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks., and . ICC, page 1-5. IEEE, (2010)Tracking the Mobile Jammer Continuously in Time by Using Moving Vector., , , and . ISCID (1), page 43-48. IEEE, (2017)A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection., , , , , and . ICC, page 2688-2693. IEEE, (2022)Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation., , , , , , and . AAAI, page 5420-5427. AAAI Press, (2023)A Unified Host-based Intrusion Detection Framework using Spark in Cloud., , and . TrustCom, page 97-103. IEEE, (2020)Two Stochastic Models for Security Evaluation Based on Attack Graph., , , and . ICYCS, page 2198-2203. IEEE Computer Society, (2008)Character-Level Intrusion Detection Based On Convolutional Neural Networks., , and . IJCNN, page 1-8. IEEE, (2018)Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States., , , , and . CIT, page 263-269. IEEE Computer Society, (2014)AN-Net: an Anti-Noise Network for Anonymous Traffic Classification., , and . WWW, page 4417-4428. ACM, (2024)