Login / Signup
Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC.
Osamu Takyu
Kengo Matsumoto
Tomoaki Ohtsuki
Takeo Fujii
Fumihito Sasamori
Shiro Handa
Published in:
WCNC (2016)
Keyphrases
</>
information sources
information processing
raw data
domain knowledge
end users
higher level
optimal solution
prior knowledge
structural information