23 results on '"Forouzesh, Moslem"'
Search Results
2. Secure Transmission with Different Security Requirements Based on Covert Communication and Information-Theoretic Security in Presence of Friendly Jammer
3. Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
4. Covert communication based on energy harvesting and cooperative jamming
5. Covert Communication Using Null Space and 3D Beamforming
6. Bit Error Probability Instead of Secrecy Rate Criterion to Enhance Performance for Secure Wireless Communication Systems
7. Robust Power Allocation in Covert Communication: Imperfect CDI
8. Covert Transmission with Antenna Selection and Using an External Jammer
9. Secure transmission with covert requirement in untrusted relaying networks
10. Robust Physical Layer Security for Power Domain Non-orthogonal Multiple Access-Based HetNets and HUDNs, SIC Avoidance at Eavesdroppers
11. Information-Theoretic Security or Covert Communication
12. Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
13. Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions
14. Secure Transmission with Different Security Requirements Based on Covert Communication and Information-Theoretic Security in Presence of Friendly Jammer
15. Robust Power Allocation in Covert Communication: Imperfect CDI
16. Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
17. Covert Communication Using Null Space and 3D Beamforming: Uncertainty of Willie's Location Information
18. Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens
19. Robust Physical Layer Security for Power Domain Non-Orthogonal Multiple Access-Based HetNets and HUDNs: SIC Avoidance at Eavesdroppers
20. Secure Transmission with Covert Requirement in Untrusted Relaying Networks
21. Radio resource allocation in heterogeneous cellular networks based on effective capacity maximization: Perspective mobile data offloading
22. Reduce impact of false detection of adversary states on the secure cooperative network
23. Secure Full Duplex Communications in the Presence of Malicious Adversary.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.