Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uplink Coordinated Scheduling Based on Resource Sorting., , , , , and . VTC Fall, page 1-5. IEEE, (2012)Distributed Precoding with Limited Interference Leakage for MU-MIMO System., , , and . IEICE Transactions, 94-B (12): 3391-3394 (2011)Probabilistic Estimation of Threat Intrusion in Embedded Systems for Runtime Detection., , and . ACM Trans. Embed. Comput. Syst., 20 (2): 14:1-14:27 (2021)Decentralized antenna selection with no CSI sharing for multi-cell MU-MIMO systems., , , , and . PIMRC, page 2319-2323. IEEE, (2012)An adaptive frequency allocation scheme for OFDMA femtocell networks., , , , and . CCIS, page 889-892. IEEE, (2012)Time and Sequence Integrated Runtime Anomaly Detection for Embedded Systems., and . ACM Trans. Embed. Comput. Syst., 17 (2): 38:1-38:27 (2018)Analysis of Control Flow Events for Timing-based Runtime Anomaly Detection., and . WESS, page 3. ACM, (2015)Timing-based anomaly detection in embedded systems., , and . ASP-DAC, page 809-814. IEEE, (2015)Data-driven Anomaly Detection with Timing Features for Embedded Systems., and . ACM Trans. Design Autom. Electr. Syst., 24 (3): 33:1-33:27 (2019)Hardware-Based Probabilistic Threat Detection and Estimation for Embedded Systems., , and . ICCD, page 522-529. IEEE Computer Society, (2018)