Get my own profile
Public access
View all31 articles
12 articles
available
not available
Based on funding mandates
Co-authors
- Bhavani Shankar MysoreUniversity of LuxembourgVerified email at uni.lu
- Björn OtterstenProfessor, SnT, University of Luxembourg, KTH Royal Institute of Technology, Stockholm, SwedenVerified email at uni.lu
- Daniel P. PalomarDepartment of Electronic & Computer Engineering, Department of Industrial Eng. & Decision AnalyticsVerified email at ust.hk
- Kumar Vijay MishraUnited States DEVCOM Army Research LaboratoryVerified email at ieee.org
- Ziyang ChengUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
- Mohammad Alaee-KerahroodiInterdisciplinary Centre for Security, Reliability and Trust, Université du LuxembourgVerified email at uni.lu
- Domenico CiuonzoTenure-Track Professor, Università degli Studi di Napoli Federico IIVerified email at unina.it
- Sheng XuShenzhen Institute of Advanced Technology, Chinese Academy of SciencesVerified email at siat.ac.cn
- Huiping HUANGMarie Curie Fellow, Chalmers University of Technology, Darmstadt University of TechnologyVerified email at chalmers.se
- Marco LopsUniversità di Napoli Federico IIVerified email at unicas.it
- Abdelhak M. ZoubirProfessor of Signal Processing, Technische Universität DarmstadtVerified email at spg.tu-darmstadt.de
- Bin LiaoShenzhen UniversityVerified email at szu.edu.cn
- Pramod VarshneyDistinguished Professor of EECS, Syracuse UniversityVerified email at syr.edu
- Wei LiuDepartment of Electrical and Electronic Engineering, The Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
- Guolong CuiUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Follow