Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eavesdropping with Intelligent Reflective Surfaces: Threats and Defense Strategies., , and . WiOpt, page 286-292. IFIP, (2021)Rayleigh Quotient Based Analysis of MIMO Linear Receivers., , and . WSA, page 1-6. VDE-Verlag / IEEE, (2017)Arbitrating Network Services in 5G Networks for Automotive Vertical Industry., , , , , , , , , and 4 other author(s). INFOCOM Workshops, page 1318-1319. IEEE, (2020)Concurrent association in heterogeneous networks with underlay D2D communication., , and . IWCMC, page 56-61. IEEE, (2017)Invited Paper: Enhancing Privacy in Federated Learning via Early Exit., , , and . ApPLIED@PODC, page 10:1-10:5. ACM, (2023)Secret Key Generation Based on AoA Estimation for Low SNR Conditions., , , , , and . VTC Spring, page 1-7. IEEE, (2015)Mobile Transport and Computing Platform for 5G Verticals: Resource Abstraction and Implementation., , , , , , , , , and 6 other author(s). NFV-SDN, page 1-6. IEEE, (2018)On the use of a Cooperative Neighbor Position Verification scheme to secure warning message dissemination in VANETs., , , , , , , , and . LCN, page 276-279. IEEE Computer Society, (2013)An RL Approach to Radio Resource Management in Heterogeneous Virtual RANs., , and . WONS, page 1-8. IEEE, (2021)Virtualization-based Evaluation of Backhaul Performance in Vehicular Applications., , and . CoRR, (2018)