Hendrik Vogt

Orcid: 0000-0002-4537-2938

According to our database1, Hendrik Vogt authored at least 15 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Defensive Perception: Estimation and Monitoring of Neural Network Performance under Deployment.
CoRR, 2023

2019
State-Space Adaptive Nonlinear Self-Interference Cancellation for Full-Duplex Communication.
IEEE Trans. Signal Process., 2019

Secret-Key Generation: Full-Duplex Versus Half-Duplex Probing.
IEEE Trans. Commun., 2019

On the Precise Phase Recovery for Physical-Layer Authentication in Dynamic Channels.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Information Detection and Energy Harvesting Trade-off in Multi-User Secure Communication.
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019

Adaptive Self-Interference Cancellation for Full Duplex Systems with Auxiliary Receiver.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

Domain is of the Essence: Data Deployment for City-Scale Multi-Camera Vehicle Re-Identification.
Proceedings of the 16th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2019

2017
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version).
CoRR, 2017

On the Capacity Region of Deterministic Strong IC with Multicast and Secure Unicast Messages.
Proceedings of the WSA 2017, 2017

2016
Practical Secret-Key Generation by Full-Duplex Nodes with Residual Self-Interference.
Proceedings of the WSA 2016, 2016

The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

On deterministic IC with common and private message under security constraints.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

2015
Full-duplex vs. half-duplex secret-key generation.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

2014
Secret-key generation from wireless channels: Mind the reflections.
Proceedings of the IEEE International Conference on Communications, 2014

Gaussian wiretap channels with correlated sources: Approaching capacity region within a constant gap.
Proceedings of the IEEE International Conference on Communications, 2014


  Loading...