Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Centralized to Decentralized Coded Caching., , and . CoRR, (2018)LiDAR-based Outdoor Crowd Management for Smart Campus on the Edge., , , and . CoRR, (2023)Confidence-Based Federated Distillation for Vision-Based Lane-Centering., , , , and . ICASSP Workshops, page 1-5. IEEE, (2023)Visualization of a hydro-electric generating unit and its applications., , and . SMC, page 2354-2359. IEEE, (2003)Case Study of Immersive Digital Learning in Public Space for Common Good Education., , and . ICDEL, page 72-77. ACM, (2023)A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography., , and . Secur. Commun. Networks, 5 (12): 1423-1429 (2012)Interference-Aware Intelligent Scheduling for Virtualized Private 5G Networks., , , , , , , , , and 4 other author(s). IEEE Access, (2024)Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model., , , , and . ICC, page 3768-3773. IEEE, (2023)Exploring the capabilities of mobile devices in supporting deep learning., , and . SEC, page 127-138. ACM, (2019)Collision Detection in Dense Wi-Fi Networks using Self-Interference Cancellation., , and . ICC Workshops, page 1-6. IEEE, (2020)