Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Overview of Post-Disaster Emergency Communication Systems in the Future Networks., , , , , and . IEEE Wirel. Commun., 26 (6): 132-139 (2019)Control-Data Separation Architecture for Cellular Radio Access Networks: A Survey and Outlook., , , , and . IEEE Commun. Surv. Tutorials, 18 (1): 446-465 (2016)An Outlook on the Interplay of AI and Software-Defined Metasurfaces., , , , , , and . CoRR, (2020)Internet of Mirrors for Connected Healthcare and Beauty: A Prospective Vision., , , and . CoRR, (2023)RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks., , , , , , , and . Sensors, 23 (8): 4104 (2023)Autonomous D2D Transmission Scheme in URLLC for Real-Time Wireless Control Systems., , , , and . IEEE Trans. Commun., 69 (8): 5546-5558 (2021)Vision-Assisted Beam Prediction for Real World 6G Drone Communication., , , , , and . PIMRC, page 1-7. IEEE, (2023)Age of Control Process for Real-Time Wireless Control., , , , , and . PIMRC, page 1-5. IEEE, (2021)Robot Mimicry Attack on Keystroke-Dynamics User Identification and Authentication System., , , , , and . ICRA, page 9879-9884. IEEE, (2023)Energy Efficiency Contours for Single-Carrier Downlink Channels., , , and . IEEE Commun. Lett., 15 (12): 1307-1309 (2011)