Get my own profile
Public access
View all4 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Gerhard WunderProfessor Information theory for Cybersecurity and Machine LearningVerified email at fu-berlin.de
Peter JungTU-Berlin, Fraunhofer Heinrich Hertz Institute and TU MunichVerified email at tu-berlin.de
Slawomir StanczakTechnische Universität Berlin and Fraunhofer HHIVerified email at tu-berlin.de
Nageen HimayatVerified email at ieee.org
Howard HuangNokia Bell LabsVerified email at nokia-bell-labs.com
Reinaldo A. ValenzuelaDir. Wireless Comms. Research Dept., Bell Labs, Alcatel-LucentVerified email at alcatel-lucent.com
Hosein NikopourIntel Santa Clara, CAVerified email at intel.com
Mustafa Riza AkdenizIntel LabsVerified email at intel.com
Mario GoldenbaumProfessor, Bremen University of Applied SciencesVerified email at hs-bremen.de
Ehsan AryafarPortland State UniversityVerified email at pdx.edu
Jing ZhuIntelVerified email at intel.com
Jafar Mohammadi (Aco)Nokia Bell LabsVerified email at jacobs-alumni.de