Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Trust for Resilient Hypothesis Testing with Malicious Robots., , , , and . ICRA, page 7663-7669. IEEE, (2023)Asynchronous Transmission Over Single-User State-Dependent Channels., , and . IEEE Trans. Inf. Theory, 61 (11): 5854-5867 (2015)Energy Efficient Bidirectional Massive MIMO Relay Beamforming., , , and . IEEE Signal Process. Lett., 24 (7): 1010-1014 (2017)Virtual Cell Clustering with Optimal Resource Allocation to Maximize Cellular System Capacity., and . GLOBECOM, page 1-7. IEEE, (2019)Collaborative Mean Estimation over Intermittently Connected Networks with Peer-To-Peer Privacy., , , , and . ISIT, page 174-179. IEEE, (2023)Exploiting Local and Cloud Sensor Fusion in Intermittently Connected Sensor Networks., , and . GLOBECOM, page 1-7. IEEE, (2020)Multi-Armed Bandits With Self-Information Rewards., and . IEEE Trans. Inf. Theory, 69 (11): 7160-7184 (November 2023)On Channels with Asynchronous Side Information., , and . CoRR, (2014)On Simultaneous Percolation with Two Disk Types., , , and . CoRR, (2016)How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems., , , , , and . CoRR, (2023)