Author of the publication

Using the physical layer for wireless authentication in time-variant channels.

, , , and . IEEE Trans. Wirel. Commun., 7 (7): 2571-2579 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning., , , and . CoRR, (2018)Optimizing Distributed MIMO Wi-Fi Networks with Deep Reinforcement Learning., , , , , and . CoRR, (2018)Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems., , , and . ITSC, page 307-312. IEEE, (2018)ProxiMate: proximity-based secure pairing using ambient wireless signals., , , , and . MobiSys, page 211-224. ACM, (2011)Adaptive Transmitter Optimization in Multiuser Multiantenna Systems: Theoretical Limits, Effect of Delays, and Performance Enhancements., , and . EURASIP J. Wireless Comm. and Networking, 2005 (3): 298-307 (2005)Bandwidth Exchange for enabling forwarding in wireless access networks., , and . PIMRC, page 2628-2632. IEEE, (2009)Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras., , , , , and . VLCS@MobiCom, page 39-44. ACM, (2014)High-rate flicker-free screen-camera communication with spatially adaptive embedding., , , , , , , and . INFOCOM, page 1-9. IEEE, (2016)A dynamic colonel blotto game model for spectrum sharing in wireless networks., and . Allerton, page 287-294. IEEE, (2017)Coalitional Games in Gaussian Interference Channels., , and . ISIT, page 2210-2214. IEEE, (2006)