Get my own profile
Public access
View all30 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Ahmed Hussen AbdelazizAppleVerified email at apple.com
Martin HeckmannAalen University of Applied SciencesVerified email at hs-aalen.de
Hendrik MeutznerRuhr-University BochumVerified email at rub.de
Katharina KohlsRuhr University BochumVerified email at rub.de
Marc DelcroixNTT Communication Science LaboratoriesVerified email at ieee.org
Tomohiro NakataniNTT Communication Science LaboratoriesVerified email at ieee.org
Rahim SaeidiPrincipal Data Scientist at ZscalerVerified email at zscaler.com
Shinji WatanabeCarnegie Mellon UniversityVerified email at cmu.edu
Reinhold Haeb-UmbachProfessor of Communications Engineering, University of PaderbornVerified email at nt.uni-paderborn.de
Ning MaUniversity of SheffieldVerified email at sheffield.ac.uk
Alberto AbadINESC-ID, Instituto Superior Técnico, University of Lisbon, PortugalVerified email at l2f.inesc-id.pt
Pejman MowlaeeLead Research ScientistVerified email at tugraz.at
Heiko WersingHonda Research Institute EuropeVerified email at honda-ri.de
Markus BärPhysikalisch-Technische Bundesanstalt (PTB); TU Berlin, Theoretical PhysicsVerified email at ptb.de
Sebastian Gergenspexa GmbHVerified email at spexa.de
Armin KohlrauschPhilips Research and TU EindhovenVerified email at philips.com
Jike ChongCarnegie Mellon UniversityVerified email at andrew.cmu.edu
John HersheyGoogle (formerly MERL, IBM, MSR, UCSD)Verified email at google.com
Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr