default search action
Arsenia Chorti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Muralikrishnan Srinivasan, Linda Senigagliesi, Hui Chen, Arsenia Chorti, Marco Baldi, Henk Wymeersch:
AoA-Based Physical Layer Authentication in Analog Arrays under Impersonation Attacks. SPAWC 2024: 496-500 - [c44]Atsu Kokuvi Angélo Passah, Rodrigo C. de Lamare, Arsenia Chorti:
Physical Layer Authentication Using Information Reconciliation. VTC Spring 2024: 1-5 - [c43]Amitha Mayya, Arsenia Chorti, Rafael F. Schaefer, Gerhard P. Fettweis:
Secret Key Generation Rates for Line of Sight Multipath Channels in the Presence of Eavesdroppers. WSA 2024: 1-6 - [i32]Atsu Kokuvi Angélo Passah, Rodrigo C. de Lamare, Arsenia Chorti:
Physical Layer Authentication Using Information Reconciliation. CoRR abs/2404.12874 (2024) - [i31]Muralikrishnan Srinivasan, Linda Senigagliesi, Hui Chen, Arsenia Chorti, Marco Baldi, Henk Wymeersch:
AoA-Based Physical Layer Authentication in Analog Arrays under Impersonation Attacks. CoRR abs/2407.08282 (2024) - 2023
- [j30]Maximilian Matthé, Arsenia Chorti:
Analysis of the Mutual Information of Channel Phase Observations in Line-of-Sight Scenarios. Entropy 25(7): 1038 (2023) - [j29]Thuy M. Pham, Miroslav Mitev, Arsenia Chorti, Gerhard P. Fettweis:
Pilot Randomization to Protect MIMO Secret Key Generation Systems Against Injection Attacks. IEEE Wirel. Commun. Lett. 12(7): 1234-1238 (2023) - [c42]Thuy M. Pham, Linda Senigagliesi, Marco Baldi, Gerhard P. Fettweis, Arsenia Chorti:
Machine Learning-Based Robust Physical Layer Authentication Using Angle of Arrival Estimation. GLOBECOM 2023: 13-18 - [c41]Francesco Mazzo, Stefano Tomasin, Hongliang Zhang, Arsenia Chorti, H. Vincent Poor:
Physical-Layer Challenge-Response Authentication for Drone Networks. GLOBECOM 2023: 3282-3287 - [c40]Amitha Mayya, Miroslav Mitev, Arsenia Chorti, Gerhard P. Fettweis:
A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack. GLOBECOM 2023: 3451-3456 - [c39]Miroslav Mitev, Arsenia Chorti, Gerhard P. Fettweis:
Physical Layer Secret Key Generation with Kalman Filter Detrending. GLOBECOM 2023: 5007-5012 - [c38]George Alkhoury, Sara Berri, Arsenia Chorti:
Deep Reinforcement Learning-Based Network Slicing Algorithm for 5G Heterogenous Services. GLOBECOM 2023: 5190-5195 - [c37]Mouktar Bello, Arsenia Chorti, Inbar Fijalkow:
On the Optimal Power Allocation at the MAC Layer in the Asymptotic and in the Finite Blocklength. ICC 2023: 2111-2116 - [c36]Solomon Orduen Yese, Sara Berri, Arsenia Chorti:
Novel Slice Admission Control Scheme with Overbooking and Dynamic Buyback Process. NFV-SDN 2023: 111-116 - [d1]Amitha Mayya, Miroslav Mitev, Arsenia Chorti, Gerhard P. Fettweis:
Dataset for the paper: A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack. IEEE DataPort, 2023 - [i30]Miroslav Mitev, Arsenia Chorti, Gerhard P. Fettweis:
Physical Layer Secret Key Generation with Kalman Filter Detrending. CoRR abs/2305.04540 (2023) - [i29]Amitha Mayya, Miroslav Mitev, Arsenia Chorti, Gerhard P. Fettweis:
A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack. CoRR abs/2305.09251 (2023) - [i28]Miroslav Mitev, Amitha Mayya, Arsenia Chorti:
Joint secure communication and sensing in 6G networks. CoRR abs/2310.14624 (2023) - [i27]Stephanie Gil, Michal Yemini, Arsenia Chorti, Angelia Nedic, H. Vincent Poor, Andrea J. Goldsmith:
How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems. CoRR abs/2311.07492 (2023) - 2022
- [j28]Sotiris Skaperas, Nasim Ferdosian, Arsenia Chorti, Lefteris Mamatas:
Scheduling of Heterogeneous Services by Resolving Conflicts. IEEE Access 10: 36576-36591 (2022) - [j27]Miroslav Mitev, Mahdi Shakiba-Herfeh, Arsenia Chorti, Martin J. Reed, Sajjad Baghaee:
A Physical Layer, Zero-Round-Trip-Time, Multifactor Authentication Protocol. IEEE Access 10: 74555-74571 (2022) - [j26]Stefano Tomasin, Hongliang Zhang, Arsenia Chorti, H. Vincent Poor:
Challenge-Response Physical Layer Authentication over Partially Controllable Channels. IEEE Commun. Mag. 60(12): 138-144 (2022) - [j25]Arsenia Chorti, André Noll Barreto, Stefan Köpsell, Marco Zoli, Marwa Chafii, Philippe Sehier, Gerhard P. Fettweis, H. Vincent Poor:
Context-Aware Security for 6G Wireless: The Role of Physical Layer Security. IEEE Commun. Stand. Mag. 6(1): 102-108 (2022) - [j24]Miroslav Mitev, M. Majid Butt, Philippe Sehier, Arsenia Chorti, Luca Rose, Arto Lehti:
Smart Link Adaptation and Scheduling for IIoT. IEEE Netw. Lett. 4(1): 6-10 (2022) - [j23]Gustavo A. Nunez Segura, Arsenia Chorti, Cíntia Borges Margi:
Centralized and Distributed Intrusion Detection for Resource-Constrained Wireless SDN Networks. IEEE Internet Things J. 9(10): 7746-7758 (2022) - [j22]Binbin Su, Wenjuan Yu, Hongbo Liu, Arsenia Chorti, H. Vincent Poor:
Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping. IEEE Wirel. Commun. Lett. 11(5): 878-882 (2022) - [c35]Ashutosh Dutta, Eman M. Hammad, Michael A. Enright, Fawzi Behmann, Arsenia Chorti, Ahmad Cheema, Kassi Kadio, Julia Urbina-Pineda, Khaled Alam, Ahmed Limam, Fred Chu, John Lester, Jong-Geun Park, Joseph Bio-Ukeme, Sanjay S. Pawar, Roslyn Layton, Prakash Ramchandran, Kingsley Okonkwo, Lyndon Ong, Marc Emmelmann, Omneya Issa, Rajakumar Arul, Sireen Malik, Sivarama Krishnan, Suresh Sugumar, TK Lala, Matthew Borst, Brad Kloza, Gunes Karabulut-Kurt:
INGR Security and Privacy Roadmap - 2022 Edition. FNWF 2022: 718-788 - [c34]George Alkhoury, Sara Berri, Arsenia Chorti:
Task Offloading with 5G Network Slicing for V2X Communications. GLOBECOM 2022: 4425-4430 - [c33]Muralikrishnan Srinivasan, Sotiris Skaperas, Mahdi Shakiba-Herfeh, Arsenia Chorti:
Joint Localization-based Node Authentication and Secret Key Generation. ICC 2022: 32-37 - [i26]Arsenia Chorti:
Physical Layer Security for 6G Systems why it is needed and how to make it happen. CoRR abs/2205.01552 (2022) - [i25]Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti, Mahdi Shakiba-Herfeh, Muhammad Karam Shehzad, Philippe Sehier:
Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation. CoRR abs/2206.00332 (2022) - [i24]Miroslav Mitev, Thuy M. Pham, Arsenia Chorti, André Noll Barreto, Gerhard P. Fettweis:
Physical Layer Security - from Theory to Practice. CoRR abs/2210.13261 (2022) - [i23]Miroslav Mitev, Arsenia Chorti, H. Vincent Poor, Gerhard P. Fettweis:
What Physical Layer Security Can Do for 6G Security. CoRR abs/2212.00427 (2022) - 2021
- [j21]Wafa Njima, Marwa Chafii, Arsenia Chorti, Raed M. Shubair, H. Vincent Poor:
Indoor Localization Using Data Augmentation via Selective Generative Adversarial Networks. IEEE Access 9: 98337-98347 (2021) - [j20]Miroslav Mitev, Arsenia Chorti, Elena Veronica Belmega, H. Vincent Poor:
Protecting Physical Layer Secret Key Generation from Active Attacks. Entropy 23(8): 960 (2021) - [c32]Nasim Ferdosian, Sotiris Skaperas, Arsenia Chorti, Lefteris Mamatas:
Conflict-Aware Multi-Numerology Radio Resource Allocation for Heterogeneous Services. ICC Workshops 2021: 1-6 - [c31]Mahdi Shakiba-Herfeh, Laura Luzzi, Arsenia Chorti:
Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels. ITW 2021: 1-6 - [c30]Mahdi Shakiba-Herfeh, Arsenia Chorti:
Comparison of Short Blocklength Slepian-Wolf Coding for Key Reconciliation. SSP 2021: 111-115 - [c29]Gustavo A. Nunez Segura, Arsenia Chorti, Cíntia Borges Margi:
Distributed DoS Attack Detection in SDN: Tradeoffs in Resource Constrained Wireless Networks. SSP 2021: 131-135 - [c28]Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti:
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys. WSA 2021: 1-5 - [i22]Arsenia Chorti, André Noll Barreto, Stefan Köpsell, Marco Zoli, Marwa Chafii, Philippe Sehier, Gerhard P. Fettweis, H. Vincent Poor:
Context-Aware Security for 6G Wireless The Role of Physical Layer Security. CoRR abs/2101.01536 (2021) - [i21]Gustavo A. Nunez Segura, Arsenia Chorti, Cíntia Borges Margi:
Centralized and Distributed Intrusion Detection for Resource Constrained Wireless SDN Networks. CoRR abs/2103.01262 (2021) - [i20]Arsenia Chorti, David Picard:
Rate Analysis and Deep Neural Network Detectors for SEFDM FTN Systems. CoRR abs/2103.02306 (2021) - [i19]Mahdi Shakiba-Herfeh, Laura Luzzi, Arsenia Chorti:
Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels. CoRR abs/2105.10747 (2021) - [i18]Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti:
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys. CoRR abs/2110.15415 (2021) - [i17]André Noll Barreto, Stefan Köpsell, Arsenia Chorti, Bertram Poettering, Jens Jelitto, Julia Hesse, Jonathan Boole, Konrad Rieck, Marios Kountouris, Dave Singelée, Kumar Ashwinee:
Towards Intelligent Context-Aware 6G Security. CoRR abs/2112.09411 (2021) - 2020
- [b1]Arsenia Chorti:
Security Protocols and Resource Allocation for Fifth Generation Networks. CY Cergy Paris University, France, 2020 - [j19]Sotiris Skaperas, Lefteris Mamatas, Arsenia Chorti:
Real-Time Algorithms for the Detection of Changes in the Variance of Video Content Popularity. IEEE Access 8: 30445-30457 (2020) - [j18]Miroslav Mitev, Arsenia Chorti, Martin J. Reed, Leila Musavian:
Authenticated secret key generation in delay-constrained wireless systems. EURASIP J. Wirel. Commun. Netw. 2020(1): 122 (2020) - [j17]Mouktar Bello, Arsenia Chorti, Inbar Fijalkow, Wenjuan Yu, Leila Musavian:
Asymptotic Performance Analysis of NOMA Uplink Networks Under Statistical QoS Delay Constraints. IEEE Open J. Commun. Soc. 1: 1691-1706 (2020) - [j16]Mylene Pischella, Arsenia Chorti, Inbar Fijalkow:
Performance Analysis of Uplink NOMA-Relevant Strategy Under Statistical Delay QoS Constraints. IEEE Wirel. Commun. Lett. 9(8): 1323-1326 (2020) - [c27]Mouktar Bello, Wenjuan Yu, Arsenia Chorti, Leila Musavian:
Performance Analysis of NOMA Uplink Networks under Statistical QoS Delay Constraints. ICC 2020: 1-7 - [c26]Gustavo A. Nunez Segura, Sotiris Skaperas, Arsenia Chorti, Lefteris Mamatas, Cíntia Borges Margi:
Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks. ICC Workshops 2020: 1-7 - [c25]Gustavo A. Nunez Segura, Arsenia Chorti, Cíntia Borges Margi:
Multimetric Online Intrusion Detection in Software-Defined Wireless Sensor Networks. LATINCOM 2020: 1-6 - [i16]Mahdi Shakiba-Herfeh, Arsenia Chorti, H. Vincent Poor:
Physical Layer Security: Authentication, Integrity and Confidentiality. CoRR abs/2001.07153 (2020) - [i15]Miroslav Mitev, Arsenia Chorti, Martin J. Reed, Leila Musavian:
Authenticated Secret Key Generation in Delay Constrained Wireless Systems. CoRR abs/2001.07162 (2020) - [i14]Mouktar Bello, Wenjuan Yu, Mylene Pischella, Arsenia Chorti, Inbar Fijalkow, Leila Musavian:
Flexible Multiple Access Enabling Low-Latency Communications: Introducing NOMA-R. CoRR abs/2001.10637 (2020) - [i13]Mouktar Bello, Wenjuan Yu, Arsenia Chorti, Leila Musavian:
Performance Analysis of NOMA Uplink Networks under Statistical QoS Delay Constraints. CoRR abs/2003.04758 (2020) - [i12]Gustavo A. Nunez Segura, Sotiris Skaperas, Arsenia Chorti, Lefteris Mamatas, Cíntia Borges Margi:
Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks. CoRR abs/2003.12027 (2020) - [i11]Miroslav Mitev, Arsenia Chorti, Elena Veronica Belmega, Martin J. Reed:
Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation. CoRR abs/2003.12034 (2020) - [i10]Mylene Pischella, Arsenia Chorti, Inbar Fijalkow:
Performance Analysis of Uplink NOMA-Relevant Strategy Under Statistical Delay QoS Constraints. CoRR abs/2004.11226 (2020) - [i9]Mouktar Bello, Arsenia Chorti, Inbar Fijalkow, Wenjuan Yu, Leila Musavian:
Asymptotic Performance Analysis of NOMA Uplink Networks Under Statistical QoS Delay Constraints. CoRR abs/2007.13919 (2020) - [i8]Miroslav Mitev, Mahdi Shekiba-Herfeh, Arsenia Chorti, Martin J. Reed:
Multi-factor Physical Layer Security Authentication in Short Blocklength Communication. CoRR abs/2010.14457 (2020) - [i7]Nasim Ferdosian, Sara Berri, Arsenia Chorti:
5G New Radio Resource Allocation Optimization for Heterogeneous Services. CoRR abs/2011.00612 (2020) - [i6]Arsenia Chorti:
Brief Report on QoSec, Context Aware Security and the Role of Physical Layer Security in 6G Wireless. CoRR abs/2011.07323 (2020)
2010 – 2019
- 2019
- [j15]Sotiris Skaperas, Lefteris Mamatas, Arsenia Chorti:
Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis. IEEE Access 7: 142246-142260 (2019) - [j14]Gustavo A. Nunez Segura, Cíntia Borges Margi, Arsenia Chorti:
Understanding the Performance of Software Defined Wireless Sensor Networks under Denial of Service Attack. Open J. Internet Things 5(1): 58-68 (2019) - [j13]Wenjuan Yu, Arsenia Chorti, Leila Musavian, H. Vincent Poor, Qiang Ni:
Effective Secrecy Rate for a Downlink NOMA Network. IEEE Trans. Wirel. Commun. 18(12): 5673-5690 (2019) - [j12]Gada Rezgui, Elena Veronica Belmega, Arsenia Chorti:
Mitigating Jamming Attacks Using Energy Harvesting. IEEE Wirel. Commun. Lett. 8(1): 297-300 (2019) - [c24]Miroslav Mitev, Arsenia Chorti, Elena Veronica Belmega, Martin J. Reed:
Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation. GLOBECOM 2019: 1-6 - [c23]Miroslav Mitev, Arsenia Chorti, Martin J. Reed:
Subcarrier Scheduling for Joint Data Transfer and Key Generation Schemes in Multicarrier Systems. GLOBECOM 2019: 1-6 - [c22]Rihem Nasfi, Arsenia Chorti:
Performance Analysis of the Uplink of a Two User NOMA Network under QoS Delay Constraints. ICUFN 2019: 526-528 - [c21]Miroslav Mitev, Arsenia Chorti, Martin J. Reed:
Optimal Resource Allocation in Joint Secret Key Generation and Data Transfer Schemes. IWCMC 2019: 360-365 - [i5]Gada Rezgui, Elena Veronica Belmega, Arsenia Chorti:
Mitigating Jamming Attacks Using Energy Harvesting. CoRR abs/1901.03543 (2019) - 2018
- [c20]Sotiris Skaperas, Lefteris Mamatas, Arsenia Chorti:
Early Video Content Popularity Detection with Change Point Analysis. GLOBECOM 2018: 1-7 - 2017
- [j11]Elena Veronica Belmega, Arsenia Chorti:
Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. IEEE Trans. Inf. Forensics Secur. 12(11): 2611-2626 (2017) - [c19]Elena Veronica Belmega, Arsenia Chorti:
Energy harvesting in secret key generation systems under jamming attacks. ICC 2017: 1-6 - [c18]Arsenia Chorti:
Optimal signalling strategies and power allocation for wireless secret key generation systems in the presence of a jammer. ICC 2017: 1-6 - [c17]Arsenia Chorti, Elena Veronica Belmega:
Secret key generation in Rayleigh block fading AWGN channels under jamming attacks. ICC 2017: 1-6 - 2016
- [j10]David A. Karpuk, Arsenia Chorti:
Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference. IEEE Trans. Inf. Forensics Secur. 11(8): 1875-1887 (2016) - [c16]Arsenia Chorti:
Overcoming limitations of secret key generation in block fading channels under active attacks. SPAWC 2016: 1-5 - 2015
- [j9]Arsenia Chorti, Katerina Papadaki, H. Vincent Poor:
Optimal Power Allocation in Block Fading Channels With Confidential Messages. IEEE Trans. Wirel. Commun. 14(9): 4708-4719 (2015) - [c15]Cornelius Saiki, Arsenia Chorti:
A novel physical layer authenticated encryption protocol exploiting shared randomness. CNS 2015: 113-118 - [i4]Arsenia Chorti, Ragnar Freij, David A. Karpuk:
Degrees of Freedom and Secrecy in Wireless Relay Networks. CoRR abs/1502.06007 (2015) - [i3]David A. Karpuk, Arsenia Chorti:
Strong Secrecy in Wireless Network Coding Systems from Structured Interference. CoRR abs/1507.01098 (2015) - 2014
- [c14]Arsenia Chorti, Katerina Papadaki, H. Vincent Poor:
Optimal power allocation in block fading Gaussian channels with causal CSI and secrecy constraints. GLOBECOM 2014: 752-757 - [c13]Arsenia Chorti, Mehdi M. Molu, David A. Karpuk, Camilla Hollanti, Alister G. Burr:
Strong secrecy in wireless network coding systems with M-QAM modulators. ICCC 2014: 181-186 - [i2]Arsenia Chorti, Katerina Papadaki, H. Vincent Poor:
Optimal Power Allocation in Block Fading Gaussian Channels with Causal CSI and Secrecy Constraints. CoRR abs/1401.6790 (2014) - [i1]Arsenia Chorti, Mehdi M. Molu, David A. Karpuk, Camilla Hollanti, Alister G. Burr:
Strong Secrecy in Wireless Network Coding Systems with M-QAM Modulators. CoRR abs/1407.0915 (2014) - 2013
- [j8]Arsenia Chorti, Samir Medina Perlaza, Zhu Han, H. Vincent Poor:
On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers. IEEE J. Sel. Areas Commun. 31(9): 1850-1863 (2013) - [c12]Samir Medina Perlaza, Arsenia Chorti, H. Vincent Poor, Zhu Han:
On the impact of network-state knowledge on the Feasibility of secrecy. ISIT 2013: 2960-2964 - [c11]Samir Medina Perlaza, Arsenia Chorti, H. Vincent Poor, Zhu Han:
On the tradeoffs between network state knowledge and secrecy. WPMC 2013: 1-6 - 2012
- [c10]Arsenia Chorti:
Helping interferer physical layer security strategies for M-QAM and M-PSK systems. CISS 2012: 1-6 - [c9]Arsenia Chorti, Samir Medina Perlaza, Zhu Han, H. Vincent Poor:
Physical layer security in wireless networks with passive and active eavesdroppers. GLOBECOM 2012: 4868-4873 - [c8]Arsenia Chorti, H. Vincent Poor:
Achievable secrecy rates in physical layer secure systems with a helping interferer. ICNC 2012: 18-22 - 2011
- [j7]I. Spiliopoulos, Dionissios T. Hristopulos, Manolis P. Petrakis, Arsenia Chorti:
A multigrid method for the estimation of geometric anisotropy in environmental data from sensor networks. Comput. Geosci. 37(3): 320-330 (2011) - [j6]Arsenia Chorti, Mike Brookes:
On the Effect of Voigt Profile Oscillators on OFDM Systems. IEEE Trans. Circuits Syst. II Express Briefs 58-II(11): 768-772 (2011) - [j5]Arsenia Chorti, Mike Brookes:
Performance analysis of OFDM and DAB receivers in the presence of spurious tones. Telecommun. Syst. 46(2): 181-190 (2011) - [c7]Arsenia Chorti, H. Vincent Poor:
Faster than Nyquist interference assisted secret communication for OFDM systems. ACSCC 2011: 183-187 - 2010
- [j4]Ioannis Kanaras, Arsenia Chorti, Miguel R. D. Rodrigues, Izzat Darwazeh:
A Fast Constrained Sphere Decoder for Ill Conditioned Communication Systems. IEEE Commun. Lett. 14(11): 999-1001 (2010) - [j3]Arsenia Chorti:
How to Model the Near-to-the-Carrier Regime and the Lower Knee Frequency of Real RF Oscillators. J. Electr. Comput. Eng. 2010: 537132:1-537132:4 (2010) - [c6]Arsenia Chorti, Ioannis Kanaras, Miguel R. D. Rodrigues, Izzat Darwazeh:
Joint channel equalization and detection of Spectrally Efficient FDM signals. PIMRC 2010: 177-182
2000 – 2009
- 2009
- [c5]Ioannis Kanaras, Arsenia Chorti, Miguel R. D. Rodrigues, Izzat Darwazeh:
Spectrally Efficient FDM Signals: Bandwidth Gain at the Expense of Receiver Complexity. ICC 2009: 1-6 - [c4]Arsenia Chorti, Ioannis Kanaras:
Masked M-QAM OFDM: A simple approach for enhancing the security of OFDM systems. PIMRC 2009: 1682-1686 - [c3]Ioannis Kanaras, Arsenia Chorti, Miguel R. D. Rodrigues, Izzat Darwazeh:
Investigation of a Semidefinite Programming detection for a spectrally efficient FDM system. PIMRC 2009: 2827-2832 - 2008
- [j2]Arsenia Chorti, Dionissios T. Hristopulos:
Nonparametric Identification of Anisotropic (Elliptic) Correlations in Spatially Distributed Data Sets. IEEE Trans. Signal Process. 56(10-1): 4738-4751 (2008) - [c2]Ioannis Kanaras, Arsenia Chorti, Miguel R. D. Rodrigues, Izzat Darwazeh:
A combined MMSE-ML detection for a spectrally efficient non orthogonal FDM signal. BROADNETS 2008: 421-425 - 2007
- [c1]Arsenia Chorti, Mike Brookes:
Resolving Near-Carrier Spectral Infinities Due to 1/f Phase Noise in Oscillators. ICASSP (3) 2007: 1005-1008 - 2006
- [j1]Arsenia Chorti, Mike Brookes:
A Spectral Model for RF Oscillators With Power-Law Phase Noise. IEEE Trans. Circuits Syst. I Regul. Pap. 53-I(9): 1989-1999 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint