Author of the publication

Performance Analysis of the Wiretap Channel with a Friendly Jammer under Finite Blocklength.

, , and . GLOBECOM (Workshops), page 239-244. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation., , and . CoRR, (2016)Delay Performance of a Two-User Broadcast Channel with Security Constraints., , , and . GIIS, page 1-5. IEEE, (2018)Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel., and . IEEE Trans. Inf. Forensics Secur., (2022)On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys., , , and . ISITA, page 663-667. IEEE, (2018)Role of CSI in Short Packet Communication for Rayleigh Fading Z Interference Channel., and . GLOBECOM, page 3403-3408. IEEE, (2023)Multiuser Cognitive Radio Networks: An Information Theoretic Perspective, , , and . CoRR, (2011)On the Secrecy Capacity Region of the 2-user Z Interference Channel with Unidirectional Transmitter Cooperation., , and . CoRR, (2016)Short-Packet Communication Over a Two-User Rayleigh Fading Z-Interference Channel: From Stability Region to the Age of Information., , and . IEEE Open J. Commun. Soc., (2023)Performance analysis of congestion-aware secure broadcast channels., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 178 (2021)Performance Analysis of a MIMO System with Bursty Traffic in the presence of Energy Harvesting Jammer., , , , and . CoRR, (2021)