Hendrik Vogt
Orcid: 0000-0002-4537-2938
According to our database1,
Hendrik Vogt
authored at least 16 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Defensive Perception: Estimation and Monitoring of Neural Network Performance Under Deployment.
Proceedings of the Epistemic Uncertainty in Artificial Intelligence, 2024
2020
2019
State-Space Adaptive Nonlinear Self-Interference Cancellation for Full-Duplex Communication.
IEEE Trans. Signal Process., 2019
IEEE Trans. Commun., 2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Information Detection and Energy Harvesting Trade-off in Multi-User Secure Communication.
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019
Adaptive Self-Interference Cancellation for Full Duplex Systems with Auxiliary Receiver.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019
Domain is of the Essence: Data Deployment for City-Scale Multi-Camera Vehicle Re-Identification.
Proceedings of the 16th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2019
2017
The Passive Eavesdropper Affects my Channel: Secret-Key Rates under Real-World Conditions (Extended Version).
CoRR, 2017
On the Capacity Region of Deterministic Strong IC with Multicast and Secure Unicast Messages.
Proceedings of the WSA 2017, 2017
2016
Practical Secret-Key Generation by Full-Duplex Nodes with Residual Self-Interference.
Proceedings of the WSA 2016, 2016
The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016
2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
2014
Proceedings of the IEEE International Conference on Communications, 2014
Gaussian wiretap channels with correlated sources: Approaching capacity region within a constant gap.
Proceedings of the IEEE International Conference on Communications, 2014