Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MIMO-Assisted Channel-Based Authentication in Wireless Networks, , , and . CoRR, (2009)Dynamic spectrum access models: toward an engineering perspective in the spectrum debate., and . IEEE Communications Magazine, 46 (1): 153-160 (2008)Dynamic Radio Resource Management for Random Network Coding: Power Control and CSMA Backoff Control, , and . CoRR, (2013)A Utility-Based Approach to Power Control and Receiver Design in Wireless Data Networks, , , and . CoRR, (2005)Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems., , , and . ITSC, page 307-312. IEEE, (2018)Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning., , , and . CoRR, (2018)Optimizing Distributed MIMO Wi-Fi Networks with Deep Reinforcement Learning., , , , , and . CoRR, (2018)ProxiMate: proximity-based secure pairing using ambient wireless signals., , , , and . MobiSys, page 211-224. ACM, (2011)Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras., , , , , and . VLCS@MobiCom, page 39-44. ACM, (2014)Importance sampling for analysis of direct detection optical communication systems., and . IEEE Trans. Commun., 43 (2/3/4): 229-239 (1995)