Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication Against a Myopic Adversary., , , , and . CNS, page 1-5. IEEE, (2019)Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement., , , and . ISIT, page 126-130. IEEE, (2018)TenGAN: adversarially generating multiplex tensor graphs., , , , , and . Data Min. Knowl. Discov., 38 (1): 1-21 (January 2024)Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios., , and . IEEE Access, (2015)Wireless physical layer authentication via fingerprint embedding., , and . IEEE Commun. Mag., 53 (6): 48-53 (2015)MIMO Authentication via Deliberate Fingerprinting at the Physical Layer., and . IEEE Trans. Inf. Forensics Secur., 6 (3-1): 606-615 (2011)Multicarrier authentication at the physical layer., , and . WOWMOM, page 1-6. IEEE Computer Society, (2008)Fingerprint Embedding Authentication with Artificial Noise: MISO Regime., , , and . CNS, page 1-5. IEEE, (2019)Secret Key-Enabled Authenticated-Capacity Region, Part I: Average Authentication., , , and . IEEE Trans. Inf. Theory, 68 (10): 6802-6825 (2022)Authentication and Partial Message Correction over Adversarial Multiple-Access Channels., , , , and . CNS, page 1-6. IEEE, (2020)