For improving the performance and effectiveness of peer review, a novel
...
We derive universal classical-quantum superposition coding and universal...
Knowledge distillation is an effective method to transfer the knowledge ...
When there exists a malicious attacker in the network, we need to be car...
When there exists a malicious attacker in the network, we need to consid...
We discuss the effect of sequential error injection on information leaka...
Based on Arimoto's work in 1978, we propose an iterative algorithm for
c...
In this paper we analyze the capacity of a general model for arbitrarily...
A simulation model based on parallel systems is established, aiming to
e...
In this paper we propose a new model for arbitrarily varying
classical-q...
We analyze the security for network code when the eavesdropper can
conta...
A simple abstract model is developed as a parallel experimental basis fo...