László Czap

According to our database1, László Czap authored at least 30 papers between 1998 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Automated Speech Production Assessment of Hard of Hearing Children.
IEEE J. Sel. Top. Signal Process., 2020

2019
Features and results of a speech improvement experiment on hard of hearing children.
Speech Commun., 2019

2016
An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback.
IEEE Trans. Inf. Theory, 2016

Creating Secrets Out of Packet Erasures.
IEEE Trans. Inf. Forensics Secur., 2016

Adapting Dynamic Time Warping to the Speech of the Hearing Impaired.
Acta Cybern., 2016

2015
Secret Communication Over Broadcast Erasure Channels With State-Feedback.
IEEE Trans. Inf. Theory, 2015

Secure Network Coding With Erasures and Feedback.
IEEE Trans. Inf. Theory, 2015

Wireless Network Security: Building on Erasures.
Proc. IEEE, 2015

Towards unconditional tor-like anonymity.
Proceedings of the 2015 International Symposium on Network Coding, 2015

LP formulations for secrecy over erasure networks with feedback.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
A computer-assisted prosody pronunciation teaching system.
Proceedings of the 4st Workshop on Child, Computer and Interaction, 2014

Triangle network secrecy.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Speech assistant system.
Proceedings of the INTERSPEECH 2014, 2014

Achievable secrecy in arbitrary erasure networks with feedback.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Secret message capacity of a line network.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Securing broadcast against dishonest receivers.
Proceedings of the International Symposium on Network Coding, 2013

Exploiting common randomness: A resource for network secrecy.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

2012
Broadcasting private messages securely.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On interactive secrecy over erasure networks.
Proceedings of the 5th International Symposium on Communications, 2012

2011
Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes.
IEEE Trans. Dependable Secur. Comput., 2011

Secure Network Coding in DTNs.
IEEE Commun. Lett., 2011

Secure Capacity Region for Erasure Broadcast Channels with Feedback
CoRR, 2011

Secret message capacity of erasure broadcast channels with feedback.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Improving naturalness of visual speech synthesis.
Proceedings of the Auditory-Visual Speech Processing, 2011

On the audiovisual asynchrony of speech.
Proceedings of the Auditory-Visual Speech Processing, 2011

2010
Signatures for Multi-source Network Coding.
IACR Cryptol. ePrint Arch., 2010

Pollution Attack Defense for Coding Based Sensor Storage.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

2008
Securing coding based distributed storage in wireless sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

2000
Lip representation by image ellipse.
Proceedings of the Sixth International Conference on Spoken Language Processing, 2000

1998
Audio and audio-visual perception of consonants disturbed by white noise and 'cocktail party'.
Proceedings of the 5th International Conference on Spoken Language Processing, Incorporating The 7th Australian International Speech Science and Technology Conference, Sydney Convention Centre, Sydney, Australia, 30th November, 1998


  Loading...