On the construction of polar codes for achieving the capacity of marginal channels
暂无分享,去创建一个
[1] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[2] Emre Telatar,et al. On the rate of channel polarization , 2008, 2009 IEEE International Symposium on Information Theory.
[3] Emre Telatar,et al. Polarization for arbitrary discrete memoryless channels , 2009, 2009 IEEE Information Theory Workshop.
[4] Vahid Tabataba Vakili,et al. Polar coding for achieving the capacity of marginal channels in nonbinary-input setting , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[5] Rüdiger L. Urbanke,et al. Polar Codes for Channel and Source Coding , 2009, ArXiv.
[6] Seyed Mehdi Iranmanesh,et al. A Mutual Information Algorithm for Text-Independent Voice Conversion , 2015 .
[7] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[8] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Shlomo Shamai,et al. Secrecy-achieving polar-coding , 2010, 2010 IEEE Information Theory Workshop.
[11] Ueli Maurer,et al. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.
[12] Mikael Skoglund,et al. Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.
[13] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[14] Rüdiger L. Urbanke,et al. Polar Codes for Channel and Source Coding , 2009, ArXiv.
[15] Andrew Thangaraj,et al. Strong secrecy for erasure wiretap channels , 2010, 2010 IEEE Information Theory Workshop.
[16] U. Maurer. The Strong Secret Key Rate of Discrete Random Triples , 1994 .
[17] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[18] Junya Honda,et al. Polar Coding Without Alphabet Extension for Asymmetric Models , 2013, IEEE Transactions on Information Theory.
[19] Ilya Dumer,et al. Soft-decision decoding of Reed-Muller codes: recursive lists , 2006, IEEE Transactions on Information Theory.
[20] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[21] Sushanta Das,et al. Robustness of cooperative forward collision warning systems to communication uncertainty , 2016, 2016 Annual IEEE Systems Conference (SysCon).
[22] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[23] Mahdi Cheraghchi,et al. Invertible extractors and wiretap protocols , 2009, 2009 IEEE International Symposium on Information Theory.
[24] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.