Get my own profile
Public access
View all30 articles
9 articles
available
not available
Based on funding mandates
Co-authors
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Ahmed Hussen AbdelazizAppleVerified email at apple.com
- Martin HeckmannAalen University of Applied SciencesVerified email at hs-aalen.de
- Hendrik MeutznerRuhr-University BochumVerified email at rub.de
- Katharina KohlsRuhr University BochumVerified email at rub.de
- Marc DelcroixNTT Communication Science LaboratoriesVerified email at ieee.org
- Tomohiro NakataniNTT Communication Science LaboratoriesVerified email at ieee.org
- Rahim SaeidiPrincipal Data Scientist at ZscalerVerified email at zscaler.com
- Shinji WatanabeCarnegie Mellon UniversityVerified email at cmu.edu
- Reinhold Haeb-UmbachProfessor of Communications Engineering, University of PaderbornVerified email at nt.uni-paderborn.de
- Ning MaUniversity of SheffieldVerified email at sheffield.ac.uk
- Alberto AbadINESC-ID, Instituto Superior Técnico, University of Lisbon, PortugalVerified email at l2f.inesc-id.pt
- Pejman MowlaeeLead Research ScientistVerified email at tugraz.at
- Heiko WersingHonda Research Institute EuropeVerified email at honda-ri.de
- Markus BärPhysikalisch-Technische Bundesanstalt (PTB); TU Berlin, Theoretical PhysicsVerified email at ptb.de
- Sebastian Gergenspexa GmbHVerified email at spexa.de
- Armin KohlrauschPhilips Research and TU EindhovenVerified email at philips.com
- Jike ChongCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- John HersheyGoogle (formerly MERL, IBM, MSR, UCSD)Verified email at google.com
- Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr