Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neighborhood watch: security and privacy analysis of automatic meter reading systems., , , , , and . CCS, page 462-473. ACM, (2012)Subverting MIMO wireless systems by jamming the channel estimation procedure., and . WISEC, page 19-24. ACM, (2010)Physical Layer Techniques for Enhanced Situational Awareness., and . ICASSP, page 2234-2237. IEEE, (2010)Short paper: ACE: authenticating the channel estimation process in wireless communication systems., and . WISEC, page 91-96. ACM, (2011)ProxiMate: proximity-based secure pairing using ambient wireless signals., , , , and . MobiSys, page 211-224. ACM, (2011)Policy Based Synthesis: Data Generation and Augmentation Methods For RF Machine Learning., , , and . GlobalSIP, page 1-5. IEEE, (2019)Adversarial Examples in RF Deep Learning: Detection and Physical Robustness., , and . GlobalSIP, page 1-5. IEEE, (2019)Securing wireless systems via lower layer enforcements., , , and . Workshop on Wireless Security, page 33-42. ACM, (2006)Radio teaming: Establishing communication when communication is not possible., , and . MASS, page 365-370. IEEE Computer Society, (2008)Service Discovery and Device Identification in Cognitive Radio Networks., , , and . SECON, page 670-677. IEEE, (2007)