Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Directed Information-Based Learning for Privacy-Preserving Smart Meter Data Release., , , and . SmartGridComm, page 1-7. IEEE, (2019)Universal Weak Variable-Length Source Coding on Countable Infinite Alphabets., and . CoRR, (2017)Metric learning: cross-entropy vs. pairwise losses., , , , , , and . CoRR, (2020)Secret key generation over noisy channels with common randomness., , and . ISIT, page 510-514. IEEE, (2016)On the capacity of the wiretap channel with generalized feedback., , and . ISIT, page 1154-1158. IEEE, (2015)On the capacity of compound state-dependent channels with states known at the transmitter., and . ISIT, page 624-628. IEEE, (2010)A Halfspace-Mass Depth-Based Method for Adversarial Attack Detection., , , , , , and . Trans. Mach. Learn. Res., (2023)Transductive Learning for Textual Few-Shot Classification in API-based Embedding Models., , , , , , , and . CoRR, (2023)Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT., , , and . IEEE Trans. Inf. Theory, 59 (9): 5244-5256 (2013)Finite-Length Bounds on Hypothesis Testing Subject to Vanishing Type I Error Restrictions., , and . CoRR, (2021)