89 results on '"Kuhestani, Ali"'
Search Results
2. A machine learning multi-hop physical layer authentication with hardware impairments
3. Intelligent Reflecting Surface Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments
4. A new practical physical layer secret key generation in the presence of an untrusted relay
5. Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
6. Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?
7. Covert Transmission with Antenna Selection and Using an External Jammer
8. Secure transmission with covert requirement in untrusted relaying networks
9. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers
10. Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
11. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying
12. Secure two-way communication via a wireless powered untrusted relay and friendly jammer
13. Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
14. Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments
15. Reconfigurable Intelligent Surface-Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments
16. Adversarial Neural Network Training for Secure and Robust Brain-to-Brain Communication
17. A machine learning multi-hop physical layer authentication with hardware impairments
18. Ergodic Capacity of Power Line Communication System for Applications of Power Distribution Networks with Amplify- and- Forward Relaying
19. Can a multi-hop link relying on untrusted amplify-and-forward relays render security?
20. Characterization of untrusted relaying networks in the presence of an adversary jammer
21. RIS-Aided Secure Millimeter-Wave Communication Under RF-Chain Impairments
22. RIS-Aided Secure Millimeter-Wave Communication Under RF-Chain Impairments
23. Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions
24. Adaptive Transmission for Two-Way Relaying Optical Wireless Communications
25. Short-Packet Amplify-and-Forward Relaying for the Internet-of-Things in the Face of Imperfect Channel Estimation and Hardware Impairments
26. On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach
27. Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
28. A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer
29. Physical Layer Secrecy and Transmission Resiliency of Device-to-Device Communications
30. Can a multi-hop link relying on untrusted amplify-and-forward relays render security?
31. Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay
32. A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay
33. Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens
34. Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things
35. Characterization of untrusted relaying networks in the presence of an adversary jammer
36. Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments
37. Secure Transmission with Covert Requirement in Untrusted Relaying Networks
38. Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
39. Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
40. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer
41. Security-reliability trade-off in cyber-physical cooperative systems with non-ideal untrusted relaying
42. Secure Two-Way Communication via a Wireless Powered Untrusted Relay and Friendly Jammer
43. Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying
44. Ergodic sum rate analysis and efficient power allocation for a massive MIMO two‐way relay network
45. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers
46. EE‐RS and PA for untrusted relay network at high signal‐to‐noise ratio regime
47. Optimal power allocation to improve secrecy performance of non‐regenerative cooperative systems using an untrusted relay
48. Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network
49. Destination‐based cooperative jamming in untrusted amplify‐and‐forward relay networks: resource allocation and performance study
50. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.