Author of the publication

Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation.

, , and . CoRR, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Delay Performance of a Two-User Broadcast Channel with Security Constraints., , , and . GIIS, page 1-5. IEEE, (2018)Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation., , and . CoRR, (2016)Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel., and . IEEE Trans. Inf. Forensics Secur., (2022)On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys., , , and . ISITA, page 663-667. IEEE, (2018)Role of CSI in Short Packet Communication for Rayleigh Fading Z Interference Channel., and . GLOBECOM, page 3403-3408. IEEE, (2023)Performance analysis of congestion-aware secure broadcast channels., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 178 (2021)Short-Packet Communication Over a Two-User Rayleigh Fading Z-Interference Channel: From Stability Region to the Age of Information., , and . IEEE Open J. Commun. Soc., (2023)Performance Analysis of the Wiretap Channel with a Friendly Jammer under Finite Blocklength., , and . GLOBECOM (Workshops), page 239-244. IEEE, (2022)Performance Analysis of a MIMO System with Bursty Traffic in the presence of Energy Harvesting Jammer., , , , and . CoRR, (2021)Outer Bounds on the Sum Rate of the K-User MIMO Gaussian Interference Channel., and . IEEE Trans. Commun., 61 (1): 176-186 (2013)