C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC.
Osamu Takyu
Kengo Matsumoto
Tomoaki Ohtsuki
Takeo Fujii
Fumihito Sasamori
Shiro Handa
Published in:
WCNC (2016)
Keyphrases
</>
information sources
information processing
raw data
domain knowledge
end users
higher level
optimal solution
prior knowledge
structural information