Search

Your search keyword '"Kuhestani, Ali"' showing total 17 results

Search Constraints

Start Over You searched for: Author "Kuhestani, Ali" Remove constraint Author: "Kuhestani, Ali" Database Complementary Index Remove constraint Database: Complementary Index
17 results on '"Kuhestani, Ali"'

Search Results

1. A machine learning multi-hop physical layer authentication with hardware impairments.

2. On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach.

3. Can a multi-hop link relying on untrusted amplify-and-forward relays render security?

4. Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay.

5. Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things.

6. Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens.

7. Characterization of untrusted relaying networks in the presence of an adversary jammer.

8. Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer.

9. Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks.

10. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer.

11. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers.

12. Ergodic sum rate analysis and efficient power allocation for amassive MIMO two-way relay network.

13. Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay.

14. Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network.

Catalog

Books, media, physical & digital resources