Author of the publication

Assessing the Electromagnetic Field Exposure of 5G Transmitters: Challenges & Solutions.

, , , and . MobiWac, page 29-36. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing the Electromagnetic Field Exposure of 5G Transmitters: Challenges & Solutions., , , and . MobiWac, page 29-36. ACM, (2022)A Data Science Approach for Detecting Honeypots in Ethereum., , , and . IEEE ICBC, page 1-9. IEEE, (2020)Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain., , and . USENIX Security Symposium, page 1343-1359. USENIX Association, (2021)Oversampling Tabular Data with Deep Generative Models: Is it worth the effort?, , and . ICBINB@NeurIPS, volume 137 of Proceedings of Machine Learning Research, page 148-157. PMLR, (2020)Finding Suspicious Activities in Financial Transactions and Distributed Ledgers., , , and . ICDM Workshops, page 787-796. IEEE Computer Society, (2017)Machine Learning Techniques for Suspicious Transaction Detection and Analysis.. University of Luxembourg, Luxembourg City, Luxembourg, (2020)base-search.net (ftunivluxembourg:oai:orbilu.uni.lu:10993/44939).