Get my own profile
Public access
View all4 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Gerhard WunderProfessor Cybersecurity and AI, FU BerlinVerified email at fu-berlin.de
- Peter JungGerman Aerospace Center (DLR) and Technical University Berlin, previously FhG/HHI and TUMVerified email at tu-berlin.de
- Slawomir StanczakTechnische Universität Berlin and Fraunhofer HHIVerified email at tu-berlin.de
- Nageen HimayatVerified email at ieee.org
- Hosein NikopourIntel Santa Clara, CAVerified email at intel.com
- Mustafa Riza AkdenizIntel LabsVerified email at intel.com
- Ehsan AryafarPortland State UniversityVerified email at pdx.edu
- Oner OrhanAppleVerified email at apple.com
- Shilpa TalwarIntel CorpVerified email at intel.com
- yang-seok choiIntel corpVerified email at intel.com
- Howard HuangNokia Bell LabsVerified email at nokia-bell-labs.com
- Reinaldo A. ValenzuelaDir. Wireless Comms. Research Dept., Bell Labs, Alcatel-LucentVerified email at alcatel-lucent.com
- Mario GoldenbaumProfessor, Bremen University of Applied SciencesVerified email at hs-bremen.de
- Jafar Mohammadi (Aco)Researcehr at Nokia Bell LabsVerified email at jacobs-alumni.de
- Venkatesan Nallampatti EkambaramXpeng motorsVerified email at eecs.berkeley.edu
- Shu-ping YehIntel CorporationVerified email at intel.com
- Dawei YingIntel CorporationVerified email at intel.com
- Thushara HewavithanaSr. Technologist, Intel CorpVerified email at intel.com
- Bishwarup MondalIntelVerified email at intel.com
- Jaemin HanPh.D., Electrical and Computer Engineering, Purdue UniversityVerified email at intel.com