Author of the publication

Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach.

, , , , and . IEEE Access, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy Rate Beamforming for Multicell Networks With Information and Energy Harvesting., , , and . IEEE Trans. Signal Process., 65 (3): 677-689 (2017)Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications., , , , and . IEEE Trans. Cogn. Commun. Netw., 3 (4): 599-613 (2017)Social-aware energy efficiency optimization for device-to-device communications in 5G networks., , , , and . Comput. Commun., (2018)Optimal Video Streaming in Dense 5G Networks With D2D Communications., , , and . IEEE Access, (2018)5G Optimized Caching and Downlink Resource Sharing for Smart Cities., , , and . IEEE Access, (2018)IEEE Access Special Section Editorial: Security in Wireless Communications and Networking., , , , , , and . IEEE Access, (2018)Optimal Power Allocation for Multiuser Secure Communication in Cooperative Relaying Networks., , , , and . IEEE Wirel. Commun. Lett., 5 (5): 516-519 (2016)Adaptive transmission in MIMO AF relay networks with orthogonal space-time block codes over Nakagami-m fading., , , and . EURASIP J. Wirel. Commun. Netw., (2012)Public-Safety LTE: Communication Services, Standardization Status, and Disaster-Resilient Architecture., , , , , , and . CoRR, (2018)Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks., , , and . IEEE Trans. Inf. Forensics Secur., 11 (11): 2609-2623 (2016)