Author of the publication

Toward Intelligence in Communication Networks: A Deep Learning Identification Strategy for Radio Frequency Fingerprints.

, , , , and . ISQED, page 204-209. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assembling Modular, Hierarchical Cognitive Map Learners with Hyperdimensional Computing., and . IJCNN, page 1-9. IEEE, (2024)Independently Evolved Virulence Effectors Converge onto Hubs in a Plant Immune System Network, , , , , , , , , and 25 other author(s). Science, 333 (6042): 596--601 (Jul 29, 2011)Toward Intelligence in Communication Networks: A Deep Learning Identification Strategy for Radio Frequency Fingerprints., , , , and . ISQED, page 204-209. IEEE, (2021)Reservoir computing & extreme learning machines using pairs of cellular automata rules.. IJCNN, page 2429-2436. IEEE, (2017)Modular, Hierarchical Machine Learning for Sequential Goal Completion.. CoRR, (2024)Hardware security strategies exploiting nanoelectronic circuits., , , , , and . ASP-DAC, page 368-372. IEEE, (2013)Reservoir Computing in Embedded Systems: Three variants of the reservoir algorithm., , , , and . IEEE Consumer Electronics Magazine, 6 (3): 67-73 (2017)Spike-Time-Dependent Encoding for Neuromorphic Processors., , , , , and . JETC, 12 (3): 23:1-23:21 (2015)Foundations of memristor based PUF architectures., , , , and . NANOARCH, page 52-57. IEEE Computer Society, (2013)Analysis of dynamic linear and non-linear memristor device models for emerging neuromorphic computing hardware design., , , and . IJCNN, page 1-5. IEEE, (2010)