Get my own profile
Public access
View all4 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Gerhard WunderProfessor Cybersecurity and AI, FU BerlinVerified email at fu-berlin.de
Peter JungGerman Aerospace Center (DLR) and Technical University Berlin, previously FhG/HHI and TUMVerified email at tu-berlin.de
Slawomir StanczakTechnische Universität Berlin and Fraunhofer HHIVerified email at tu-berlin.de
Nageen HimayatVerified email at ieee.org
Hosein NikopourIntel Santa Clara, CAVerified email at intel.com
Mustafa Riza AkdenizIntel LabsVerified email at intel.com
Ehsan AryafarPortland State UniversityVerified email at pdx.edu
Oner OrhanAppleVerified email at apple.com
yang-seok choiIntel corpVerified email at intel.com
Shilpa TalwarIntel CorpVerified email at intel.com
Howard HuangNokia Bell LabsVerified email at nokia-bell-labs.com
Reinaldo A. ValenzuelaDir. Wireless Comms. Research Dept., Bell Labs, Alcatel-LucentVerified email at alcatel-lucent.com
Mario GoldenbaumProfessor, Bremen University of Applied SciencesVerified email at hs-bremen.de
Venkatesan Nallampatti EkambaramXpeng motorsVerified email at eecs.berkeley.edu
Shu-ping YehIntel CorporationVerified email at intel.com
Jafar Aco MohammadiResearcehr at Nokia Bell LabsVerified email at jacobs-alumni.de
Dawei YingIntel CorporationVerified email at intel.com
Thushara HewavithanaSr. Technologist, Intel CorpVerified email at intel.com
Bishwarup MondalIntelVerified email at intel.com
Jaemin HanPh.D., Electrical and Computer Engineering, Purdue UniversityVerified email at intel.com