Author of the publication

Unsupervised Wireless Diarization: A Potential New Attack on Encrypted Wireless Networks.

, , , , , and . ICC, page 2312-2318. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication with Mildly Myopic Adversaries., , , , and . ISIT, page 984-989. IEEE, (2020)Transmitting Arbitrary Sources with Finite Error Over a Broadcast Channel with Confidential Communications., and . ISIT, page 921-925. IEEE, (2018)Messages per secret bit when authentication and a min-entropy secrecy criterion are required., , and . CISS, page 1-6. IEEE, (2017)Certification codes for maliciousness detection in Physical-layer Network Coding., , , and . MILCOM, page 1-6. IEEE, (2012)Value-aware Importance Weighting for Off-policy Reinforcement Learning., , and . CoLLAs, volume 232 of Proceedings of Machine Learning Research, page 745-763. PMLR, (2023)Minimax Bounds for Blind Network Inference., , , and . ISIT, page 1823-1828. IEEE, (2021)An Off-policy Policy Gradient Theorem Using Emphatic Weightings., , and . NeurIPS, page 96-106. (2018)ScriptEase II: Platform Independent Story Creation Using High-Level Patterns., , , , , , , , , and 1 other author(s). AIIDE, AAAI, (2013)Identifying Bottleneck Nodes using Packet Delay Statistics., , , , and . MILCOM, page 447-452. IEEE, (2019)Keyless authentication in the presence of a simultaneously transmitting adversary., , and . ITW, page 201-205. IEEE, (2016)