Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Transient Attack on the Kish Key Distribution System., , and . IEEE Access, (2015)Secure communications using the KLJN scheme., and . Scholarpedia, 8 (8): 31157 (2013)Design and implementation of BCM rule based on spike-timing dependent plasticity., , , and . IJCNN, page 1-7. IEEE, (2012)Exploiting sparsity and low-rank structure for the recovery of multi-slice breast MRIs with reduced sampling error., , , , and . Medical Biol. Eng. Comput., 50 (9): 991-1000 (2012)Tri-orthogonal polarization diversity for 5G networks., , and . Trans. Emerg. Telecommun. Technol., 27 (7): 992-999 (2016)Tri-orthogonal polarization diversity reception for non-geosynchronous satellite orbit ionospheric channels., , and . Int. J. Satell. Commun. Netw., 36 (1): 44-65 (2018)Exploring Low Loss and Single Mode in Antiresonant Tube Lattice Terahertz Fibers., , , , , , and . IEEE Access, (2020)Distributed Bayesian vector estimation using noise-optimized low-resolution sensor observations., , , and . Digit. Signal Process., (2021)High Performance Microstrip Low Pass Filter for Wireless Communications., , , , and . Wirel. Pers. Commun., 99 (1): 497-507 (2018)RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things., , , , , , , , and . CoRR, (2021)