Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks., , , , , , , and . Sensors, 23 (8): 4104 (2023)Internet of Mirrors for Connected Healthcare and Beauty: A Prospective Vision., , , and . CoRR, (2023)An Outlook on the Interplay of AI and Software-Defined Metasurfaces., , , , , , and . CoRR, (2020)FedClamp: An Algorithm for Identification of Anomalous Client in Federated Learning., , , , , , and . ICECS 2022, page 1-4. IEEE, (2022)Real-Time Contactless WiFi Based Room Detection of Sitting and Standing Human Motions., , , , and . ICECS 2022, page 1-4. IEEE, (2022)Hybrid Beamforming with Fixed Phase Shifters for Uplink Cell-Free Millimetre-Wave Massive MIMO Systems., , , and . EuCNC/6G Summit, page 19-24. IEEE, (2021)Graph theoretic multiple access interference reduction for CDMA based radio LAN., , and . ICC, page 4147-4151. IEEE, (2004)Energy Efficiency Contours for Single-Carrier Downlink Channels., , , and . IEEE Commun. Lett., 15 (12): 1307-1309 (2011)Hybrid transmission schemes for grouped users in cellular systems., , and . IWCMC, page 561-566. IEEE, (2012)On Capacity and Bounds for the Gaussian CZIC and CBZIC with Linear Coded Approximation., , , , , , and . EW, VDE-Verlag, (2013)