default search action
Kittipong Kittichokechai
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Andreas Höglund, Mohammad Mozaffari, Yanpeng Yang, Giuseppe Moschetti, Kittipong Kittichokechai, Ravikiran Nory:
3GPP Release 18 Wake-Up Receiver: Feature Overview and Evaluations. IEEE Commun. Stand. Mag. 8(3): 10-16 (2024) - [i13]Andreas Hoglund, Mohammad Mozaffari, Yanpeng Yang, Giuseppe Moschetti, Kittipong Kittichokechai, Ravikiran Nory:
3GPP Release 18 Wake-up Receiver: Feature Overview and Evaluations. CoRR abs/2401.03333 (2024) - 2023
- [c22]Saeedeh Moloudi, Mohammad Mozaffari, Kittipong Kittichokechai, Andreas Höglund, Sandeep Narayanan Kadan Veedu, Y.-P. Eric Wang, Johan Bergman:
5G Reduced Capability Devices: Analysis of Blocking Probability for Control Channels. WCNC 2023: 1-6 - 2021
- [j7]Saeedeh Moloudi, Mohammad Mozaffari, Sandeep Narayanan Kadan Veedu, Kittipong Kittichokechai, Y.-P. Eric Wang, Johan Bergman, Andreas Höglund:
Coverage Evaluation for 5G Reduced Capability New Radio (NR-RedCap). IEEE Access 9: 45055-45067 (2021) - [c21]Mohammad Mozaffari, Y.-P. Eric Wang, Kittipong Kittichokechai:
Blocking Probability Analysis for 5G New Radio (NR) Physical Downlink Control Channel. ICC 2021: 1-6 - [i12]Saeedeh Moloudi, Mohammad Mozaffari, Sandeep Narayanan Kadan Veedu, Kittipong Kittichokechai, Y.-P. Eric Wang, Johan Bergman, Andreas Höglund:
Coverage Evaluation for 5G Reduced Capability New Radio (NR-RedCap). CoRR abs/2101.07310 (2021) - 2020
- [c20]Kittipong Kittichokechai, Mattias Andersson, Robert Baldemair, Yufei W. Blankenship:
Improved Frequency Domain Resource Allocation Indication. VTC Spring 2020: 1-5 - [i11]Mohammad Mozaffari, Y.-P. Eric Wang, Kittipong Kittichokechai:
Blocking Probability Analysis for 5G New Radio (NR) Physical Downlink Control Channel. CoRR abs/2010.08829 (2020)
2010 – 2019
- 2019
- [c19]Osama Al-Saadeh, Kimmo Hiltunen, Kittipong Kittichokechai, Alexey Shapin, Majid Gerami, Henrik Asplund, Y.-P. Eric Wang, Gustav Wikström, Joachim Sachs:
5G Ultra-Reliable Low-Latency Communication for Factory Automation at Millimetre Wave Bands. GLOBECOM 2019: 1-6 - 2018
- [j6]Joachim Sachs, Gustav Wikström, Torsten Dudda, Robert Baldemair, Kittipong Kittichokechai:
5G Radio Network Design for Ultra-Reliable Low-Latency Communication. IEEE Netw. 32(2): 24-31 (2018) - [j5]Onur Günlü, Kittipong Kittichokechai, Rafael F. Schaefer, Giuseppe Caire:
Controllable Identifier Measurements for Private Authentication With Secret Keys. IEEE Trans. Inf. Forensics Secur. 13(8): 1945-1959 (2018) - [c18]Guido Carlo Ferrante, Johan Östman, Giuseppe Durisi, Kittipong Kittichokechai:
Pilot-assisted short-packet transmission over multiantenna fading channels: A 5G case study. CISS 2018: 1-6 - [c17]Alexey Shapin, Kittipong Kittichokechai, Niklas Andgart, Mårten Sundberg, Gustav Wikström:
Physical Layer Performance for Low Latency and High Reliability in 5G. ISWCS 2018: 1-6 - [i10]Guido Carlo Ferrante, Johan Östman, Giuseppe Durisi, Kittipong Kittichokechai:
Pilot-Assisted Short-Packet Transmission over Multiantenna Fading Channels: A 5G Case Study. CoRR abs/1801.10552 (2018) - [i9]Onur Günlü, Kittipong Kittichokechai, Rafael F. Schaefer, Giuseppe Caire:
Controllable Identifier Measurements for Private Authentication with Secret Keys. CoRR abs/1804.01430 (2018) - 2016
- [j4]Kittipong Kittichokechai, Yeow-Khiang Chia, Tobias J. Oechtering, Mikael Skoglund, Tsachy Weissman:
Secure Source Coding With a Public Helper. IEEE Trans. Inf. Theory 62(7): 3930-3949 (2016) - [j3]Kittipong Kittichokechai, Giuseppe Caire:
Secret Key-Based Identification and Authentication With a Privacy Constraint. IEEE Trans. Inf. Theory 62(11): 6189-6203 (2016) - [c16]Kittipong Kittichokechai, Onur Günlü, Rafael F. Schaefer, Giuseppe Caire:
Private authentication with controllable measurement. ACSSC 2016: 1680-1684 - [c15]Kittipong Kittichokechai, Giuseppe Caire:
Privacy-constrained remote source coding. ISIT 2016: 1078-1082 - [c14]Kittipong Kittichokechai, Rafael F. Schaefer, Giuseppe Caire:
Secret key generation through a relay. ITW 2016: 196-200 - [i8]Kittipong Kittichokechai, Giuseppe Caire:
Privacy-Constrained Remote Source Coding. CoRR abs/1605.01880 (2016) - [i7]Kittipong Kittichokechai, Rafael F. Schaefer, Giuseppe Caire:
Secret Key Generation Through a Relay. CoRR abs/1607.07674 (2016) - 2015
- [j2]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Coding With Action-Dependent Side Information and Additional Reconstruction Requirements. IEEE Trans. Inf. Theory 61(11): 6355-6367 (2015) - [j1]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund, Yeow-Khiang Chia:
Secure Source Coding With Action-Dependent Side Information. IEEE Trans. Inf. Theory 61(12): 6444-6464 (2015) - [c13]Kittipong Kittichokechai, Giuseppe Caire:
Optimal tradeoff of secure PUF-based authentication. CNS 2015: 83-88 - [c12]Kittipong Kittichokechai, Giuseppe Caire:
Secret key-based authentication with a privacy constraint. ISIT 2015: 1791-1795 - [i6]Kittipong Kittichokechai, Giuseppe Caire:
Secret key-based Authentication with a Privacy Constraint. CoRR abs/1504.01614 (2015) - [i5]Kittipong Kittichokechai, Giuseppe Caire:
Secret key-based Identification and Authentication with a Privacy Constraint. CoRR abs/1508.01295 (2015) - 2014
- [b1]Kittipong Kittichokechai:
Communication With Reconstruction and Privacy Constraints. Royal Institute of Technology, Stockholm, Sweden, 2014 - [c11]Zuxing Li, Tobias J. Oechtering, Kittipong Kittichokechai:
Parallel distributed Bayesian detection with privacy constraints. ICC 2014: 2178-2183 - [c10]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Lossy source coding with reconstruction privacy. ISIT 2014: 386-390 - [c9]Derek Xu, Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Secure successive refinement with degraded side information. ISIT 2014: 2674-2678 - [i4]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Lossy Source Coding with Reconstruction Privacy. CoRR abs/1402.4308 (2014) - 2013
- [c8]Yeow-Khiang Chia, Kittipong Kittichokechai:
On secure source coding with side information at the encoder. ISIT 2013: 2204-2208 - [c7]Kittipong Kittichokechai, Yeow-Khiang Chia, Tobias J. Oechtering, Mikael Skoglund, Tsachy Weissman:
Secure source coding with a public helper. ISIT 2013: 2209-2213 - [i3]Yeow-Khiang Chia, Kittipong Kittichokechai:
On Secure Source Coding with Side Information at the Encoder. CoRR abs/1307.0974 (2013) - [i2]Kittipong Kittichokechai, Yeow-Khiang Chia, Tobias J. Oechtering, Mikael Skoglund, Tsachy Weissman:
Secure Source Coding with a Public Helper. CoRR abs/1307.1397 (2013) - 2012
- [c6]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Multi-stage coding for channels with a rewrite option and reversible input. ISIT 2012: 3063-3067 - [i1]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Coding With Action-dependent Side Information and Additional Reconstruction Requirements. CoRR abs/1202.1484 (2012) - 2011
- [c5]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
On the capacity of a channel with action-dependent state and reversible input. ISIT 2011: 331-335 - [c4]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Secure source coding with action-dependent side information. ISIT 2011: 1678-1682 - [c3]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Capacity of the channel with action-dependent state and reversible input. Swe-CTW 2011: 24-28 - 2010
- [c2]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund, Ragnar Thobaben:
Source and channel coding with action-dependent partially known two-sided state information. ISIT 2010: 629-633 - [c1]Kittipong Kittichokechai, Tobias J. Oechtering, Mikael Skoglund:
Source coding with common reconstruction and action-dependent side information. ITW 2010: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint