Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication Against a Myopic Adversary., , , , and . CNS, page 1-5. IEEE, (2019)Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement., , , and . ISIT, page 126-130. IEEE, (2018)TenGAN: adversarially generating multiplex tensor graphs., , , , , and . Data Min. Knowl. Discov., 38 (1): 1-21 (January 2024)Wireless physical layer authentication via fingerprint embedding., , and . IEEE Commun. Mag., 53 (6): 48-53 (2015)Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios., , and . IEEE Access, (2015)MIMO Authentication via Deliberate Fingerprinting at the Physical Layer., and . IEEE Trans. Inf. Forensics Secur., 6 (3-1): 606-615 (2011)Fingerprint Embedding Authentication with Artificial Noise: MISO Regime., , , and . CNS, page 1-5. IEEE, (2019)Multicarrier authentication at the physical layer., , and . WOWMOM, page 1-6. IEEE Computer Society, (2008)Securing the communication of medical information using local biometric authentication and commercial wireless links., , and . Health Informatics J., 16 (3): 211-223 (2010)Messages per secret bit when authentication and a min-entropy secrecy criterion are required., , and . CISS, page 1-6. IEEE, (2017)