Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert Communication Achieved by a Greedy Relay in Wireless Networks., , , , , and . IEEE Trans. Wirel. Commun., 17 (7): 4766-4779 (2018)Design of Non-Orthogonal Multiple Access Enhanced Backscatter Communication., , , and . IEEE Trans. Wirel. Commun., 17 (10): 6837-6852 (2018)Finite-Horizon Throughput Region for Wireless Multi-User Interference Channels., , and . IEEE Trans. Wirel. Commun., 16 (1): 634-646 (2017)Achieving Secrecy Without Knowing the Number of Eavesdropper Antennas., , and . IEEE Trans. Wirel. Commun., 14 (12): 7030-7043 (2015)Outage Probability in Arbitrarily-Shaped Finite Wireless Networks., , and . IEEE Trans. Commun., 62 (2): 699-712 (2014)Interference Suppression Using Generalized Inverse Precoder for Downlink Heterogeneous Networks., , and . IEEE Wirel. Commun. Lett., 4 (3): 325-328 (2015)SWIPT with practical modulation and RF energy harvesting sensitivity., , , and . ICC, page 1-7. IEEE, (2016)Covert Communication in Fading Channels under Channel Uncertainty., , and . VTC Spring, page 1-5. IEEE, (2017)Effect of Vehicle Mobility on Connectivity of Vehicular Ad Hoc Networks., , and . VTC Fall, page 1-5. IEEE, (2010)Connectivity of wireless ad hoc networks with random beamforming: An analytical approach., , and . PIMRC, page 1-5. IEEE, (2008)