Author of the publication

Resource Allocation for Secure Gaussian Parallel Relay Channels with Finite-Length Coding and Discrete Constellations.

, , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Autoencoder based Physical Layer Authentication for UAV Communications., , and . VTC2023-Spring, page 1-6. IEEE, (2023)Contactless Heart Rate Measurements using RGB-camera and Radar., , , , and . ICT4AWE, page 121-129. SCITEPRESS, (2020)Assessment of Human Activity Classification Algorithms for IoT Devices., , and . HealthyIoT, volume 456 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 170-181. Springer, (2022)A Machine Learning-based Method for Cyber Risk Assessment., , , , , and . CBMS, page 263-268. IEEE, (2023)Performance Evaluation of Commercial Smartwatch GPS in Obstructed Positions., , , , , , , and . ICCE, page 1-2. IEEE, (2024)Blind Physical Layer Authentication over Fading Wireless Channels through Machine Learning., , , and . WIFS, page 1-6. IEEE, (2019)Parametric and Probabilistic Model Checking of Confidentiality in Data Dispersal Algorithms (Extended Version)., , , , and . CoRR, (2016)Performance of Statistical and Machine Learning Techniques for Physical Layer Authentication., , and . CoRR, (2020)Physical Layer Authentication with Cooperative Wireless Communications and Machine Learning., , and . LATINCOM, page 1-6. IEEE, (2021)"In Bed" BCG Signal Analysis., , , and . ForItAAL, volume 725 of Lecture Notes in Electrical Engineering, page 27-38. Springer, (2019)