Login / Signup

Optimal impersonation of CSI for maximizing leaked information to untrusted relay in PLNC.

Osamu TakyuKengo MatsumotoTomoaki OhtsukiTakeo FujiiFumihito SasamoriShiro Handa
Published in: WCNC (2016)
Keyphrases
  • information sources
  • information processing
  • raw data
  • domain knowledge
  • end users
  • higher level
  • optimal solution
  • prior knowledge
  • structural information