Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel., , , , , and . CoRR, (2022)Sending a Gaussian source over an AWGN channel in the presence of an unknown interference., and . CISS, page 1-5. IEEE, (2012)Successively Structured Gaussian CEO Problem., and . GLOBECOM, IEEE, (2006)Compressive sensing MTI processing in distributed MIMO radars., , , , and . IET Signal Process., 12 (3): 327-334 (2018)Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay., , , and . IEEE Trans. Wirel. Commun., 19 (10): 6771-6785 (2020)Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments., , , , and . IEEE Access, (2019)Side Information Aware Coding Strategy in the Quadratic Gaussian CEO Problem., and . DCC, page 439. IEEE Computer Society, (2006)Reconfigurable-Intelligent-Surface-Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments., , , and . IEEE Internet Things J., 11 (9): 15808-15822 (May 2024)Distortion sum-rate performance of successive coding strategy in Gaussian wireless sensor networks., and . MASS, IEEE Computer Society, (2005)On the Transmission Strategies for the Two-User State-Dependent Gaussian Interference Channel., and . ISWCS, page 1-5. VDE-Verlag / IEEE, (2013)