Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cooperative jamming protocol for physical layer security in wireless networks., , , and . ICASSP, page 5803-5807. IEEE, (2015)Terahertz Technologies to Deliver Optical Network Quality of Experience in Wireless Systems Beyond 5G., , , , , , , , , and 4 other author(s). IEEE Communications Magazine, 56 (6): 144-151 (2018)New Constructions of High-Performance Low-Complexity Convolutional Codes., , and . IEEE Trans. Commun., 58 (7): 1950-1961 (2010)Secretly Pruned Convolutional Codes: Security Analysis and Performance Results., , and . IEEE Trans. Inf. Forensics Secur., 11 (7): 1500-1514 (2016)New Constructions of Low-Complexity Convolutional Codes., , and . ICC, page 1-6. IEEE, (2009)On (n, n-1) Punctured Convolutional Codes and Their Trellis Modules., and . IEEE Trans. Commun., 59 (5): 1213-1217 (2011)Secure encoder designs based on turbo codes., , and . ICC, page 4315-4320. IEEE, (2015)Recursive flexible convolutional encoders for parallel concatenation., , and . ISTC, page 250-254. IEEE, (2012)Flexible Convolutional Codes: Variable Rate and Complexity., , and . IEEE Trans. Commun., 60 (3): 608-613 (2012)Wireless Terahertz System Architectures for Networks Beyond 5G., , , , , , , , , and 8 other author(s). CoRR, (2018)