Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting the Reciprocal Channel for Discrete Jamming to Secure Wireless Communications Against Multiple-Antenna Eavesdropper., , , , , and . IEEE Access, (2018)SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security., , , and . Sensors, 21 (3): 856 (2021)A Non-intrusive Approach to Measuring Trust in Opponents in a Negotiation Scenario., , and . AICOL, volume 10791 of Lecture Notes in Computer Science, page 528-542. Springer, (2017)Adaptive Physical-Layer Security Through Punctured Coding for Secrecy., , , , and . ICC, page 1-6. IEEE, (2019)Interleaved Coding for Secrecy with a Hidden Key., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2015)Neural Network eXplainable AI Based on Paraconsistent Analysis - an Initial Approach., , , , , and . SSCT, 253, page 139-149. Springer, (2021)A Data-Driven Tool to Promote Tourism for People with Disabilities in a Smart City Environment., and . Intelligent Environments (Workshops), volume 26 of Ambient Intelligence and Smart Environments, page 46-51. IOS Press, (2019)Iterative Frequency-Domain Equalization for General QAM Constellations with Reduced Envelope Fluctuations through Magnitude Modulation Techniques., , , , and . VTC Spring, page 1-5. IEEE, (2015)Towards a Strategy for Performance Prediction on Heterogeneous Architectures., , , , , , and . VECPAR, volume 11333 of Lecture Notes in Computer Science, page 247-253. Springer, (2018)Collaborative Process Mapping to Improve Work Instructions and Standardized Work., , , , , , , , , and 1 other author(s). WorldCIST (1), volume 569 of Advances in Intelligent Systems and Computing, page 603-615. Springer, (2017)