| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2013 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2011 | J | jnl |
CoRR
|
| 2011 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2011 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2011 | J | jnl |
CoRR
|
| 2010 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2010 | J | jnl |
CoRR
|
| 2010 | B | conf |
ISIT
|
| 2010 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2010 | B | conf |
ISIT
|
| 2009 | J | jnl |
CoRR
|
| 2009 | B | conf |
ISIT
|
| 2009 | J | jnl |
EURASIP J. Wirel. Commun. Netw.
|
| 2009 | B | conf |
ISIT
|
| 2009 | J | jnl |
CoRR
|
| 2009 | — | conf |
Allerton
|
| 2009 | J | jnl |
CoRR
|
| 2009 | B | conf |
ISIT
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2009 | J | jnl |
Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages.
IEEE Trans. Inf. Theory
|
| 2009 | B | conf |
ISIT
|
| 2008 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2008 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2008 | J | jnl |
CoRR
|
| 2008 | B | conf |
ITW
|
| 2008 | J | jnl |
CoRR
|
| 2008 | B | conf |
ISIT
|
| 2008 | B | conf |
PIMRC
|
| 2008 | J | jnl |
CoRR
|
| 2008 | B | conf |
ISIT
|
| 2007 | J | jnl |
IEEE Trans. Wirel. Commun.
|
| 2007 | B | conf |
ISIT
|
| 2007 | J | jnl |
CoRR
|
| 2007 | J | jnl |
CoRR
|
| 2007 | J | jnl |
CoRR
|
| 2007 | Misc | conf |
CISS
|
| 2007 | J | jnl |
CoRR
|
| 2007 | J | jnl |
CoRR
|
| 2007 | J | jnl |
CoRR
|
| 2006 | J | jnl |
CoRR
|
| 2006 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2006 | J | jnl |
CoRR
|
| 2006 | B | conf |
ISIT
|
| 2005 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2004 | B | conf |
WCNC
|
| 2004 | B | conf |
ISIT
|
| 2004 | B | conf |
ISIT
|
| 2003 | — | conf |
Advances in Network Information Theory
|
| 2003 | B | conf |
ITW
|