Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Overlay Photonic Layer Security Approach Scalable to 100 Gb/s., , , , , , and . IEEE Communications Magazine, 46 (8): 32-39 (2008)Exploring 3D Cybersecurity Visualization with the Microsoft HoloLens., , , and . AHFE (9), volume 593 of Advances in Intelligent Systems and Computing, page 197-207. Springer, (2017)Deep Delay Loop Reservoir Computing for Specific Emitter Identification., , , , and . CoRR, (2020)Code-Grouping of Spectrally Phase Encoded OCDMA based on Walsh-Decomposition of Hadamard Codes., , , , and . ICC, page 2624-2629. IEEE, (2006)DWDM-compatible spectrally phase encoded optical CDMA., , , , , , and . GLOBECOM, page 1888-1894. IEEE, (2004)Reservoir-Based Distributed Machine Learning for Edge Operation of Emitter Identification., , , and . MILCOM, page 96-101. IEEE, (2021)Novel results on the coexistence of spectrally phase-encoded OCDMA and DWDM., , , , , , and . ICC, page 1608-1612. IEEE, (2005)Reservoir-Based Distributed Machine Learning for Edge Operation., , , and . CoRR, (2021)Reservoir Based Edge Training on RF Data To Deliver Intelligent and Efficient IoT Spectrum Sensors., , , and . SMARTCOMP, page 17-24. IEEE, (2021)