Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy Capacity of κ-μ Shadowed Fading Channels., and . IEEE Communications Letters, 22 (8): 1728-1731 (2018)Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation., , , , , and . CoRR, (2022)Joint Power-Control and Antenna Selection in User-Centric Cell-Free Systems With Mixed Resolution ADC., , , and . IEEE Trans. Commun., 70 (12): 8400-8415 (2022)Transmit Power Policy and Ergodic Multicast Rate Analysis of Cognitive Radio Networks in Generalized Fading., , , and . CoRR, (2019)Joint power and resource allocation of D2D communication with low-resolution ADC., , and . CoRR, (2019)Analysis of Optimal Combining in Rician Fading With Co-Channel Interference., and . IEEE Trans. Vehicular Technology, 68 (4): 3613-3628 (2019)Joint Localization-based Node Authentication and Secret Key Generation., , , and . ICC, page 32-37. IEEE, (2022)End-to-End Learning for VCSEL-based Optical Interconnects: State-of-the-Art, Challenges, and Opportunities., , , , , , , , , and 1 other author(s). CoRR, (2022)Joint power and resource allocation for D2D communication with low-resolution ADC., , and . ACSSC, page 995-999. IEEE, (2019)On the Use of CSI for the Generation of RF Fingerprints and Secret Keys., , and . WSA, page 1-5. VDE Berlag / IEEE, (2021)