Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physical Layer Security based Key Management for LoRaWAN., , , and . CoRR, (2021)DDoS Attacks in Communication: Analysis and Mitigation of Unreliable Clients in Federated Learning., , , and . CCNC, page 986-989. IEEE, (2024)Securing Industrial Wireless Networks: Enhancing SDN with PhySec., , and . NextComp, page 1-7. IEEE, (2019)Multi-Feature Physical Layer Authentication for URLLC based on Linear Supervised Learning., , , and . EuCNC/6G Summit, page 30-35. IEEE, (2023)Piezoelectric Beam Path Modulation for Visible Light Communication., , , and . ISNCC, page 1-6. IEEE, (2023)Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces., , , , , , , , and . Discov. Internet Things, 3 (1): 16 (December 2023)Secure Federated Learning: An Evaluation of Homomorphic Encrypted Network Traffic Prediction., , , and . CCNC, page 1-6. IEEE, (2023)CPU Resource Resilience in Wireless Mobile Communications: Design and Evaluation on COTS Virtual Distributed Platform., , , , and . BlackSeaCom, page 43-48. IEEE, (2022)URLLC Physical Layer Authentication based on non-linear Supervised Learning., , , and . VTC2023-Spring, page 1-7. IEEE, (2023)Putting Things in Context: Securing Industrial Authentication with Context Information., , , , and . CoRR, (2019)