Author of the publication

Rank minimization designs for underlay MIMO cognitive radio networks with completely unknown primary CSI.

, , , and . GLOBECOM, page 1150-1155. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems.. IEEE Communications Letters, 20 (7): 1361-1364 (2016)Iterative EM channel estimation for turbo-coded DS-CDMA receiver under time-varying interference., , , and . WSA, page 174-179. IEEE, (2008)Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI, and . CoRR, (2010)Prescient Beamforming by Primary Transmitters in Interweave Cognitive Radio Networks with a Single Primary Receiver, and . CoRR, (2011)Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper, and . CoRR, (2010)Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints.. Proc. IEEE, 103 (10): 1747-1761 (2015)Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey., , , and . IEEE Commun. Surv. Tutorials, 16 (3): 1550-1573 (2014)Interference self-mitigating beamforming for the K-user MIMO IC., , and . ICASSP, page 3352-3355. IEEE, (2011)Ensuring Secrecy in MIMO Wiretap Channels with Imperfect CSIT: A Beamforming Approach., and . ICC, page 1-5. IEEE, (2010)Sum-Rate Distortion in MIMO Broadcast Channels with Irregular Limited Feedback., and . GLOBECOM, page 3205-3209. IEEE, (2007)