Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-driven performance evaluation of carrier aggregation in LTE-Advanced., , , and . PIMRC, page 1-6. IEEE, (2017)A Comprehensive Study of Low Frequency and High Frequency Channel Correlation., , , , , , , , and . ICNC, page 876-882. IEEE, (2019)In-depth study of RNTI management in mobile networks: Allocation strategies and implications on data trace analysis., , , , , , , , , and . Comput. Networks, (2022)Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols., , , and . SP, page 1318-1331. IEEE, (2021)Pilotless FS-FBMC for Flexible Spectrum Access and Sharing., , , and . DySPAN, page 193-202. IEEE, (2021)From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers., , and . SP, page 3146-3161. IEEE, (2023)openLEON: An end-to-end emulation platform from the edge data center to the mobile user., , , , , and . Comput. Commun., (2019)SigUnder: a stealthy 5G low power attack and defenses., and . WISEC, page 250-260. ACM, (2021)In-depth study of RNTI management in mobile networks: Allocation strategies and implications on data trace analysis, , , , , , , , , and . Comput. Networks, (2022)Unprotected 4G/5G Control Procedures at Low Layers Considered Dangerous., , and . CoRR, (2024)