Author of the publication

Covert communication based on energy harvesting and cooperative jamming.

, , and . Wirel. Networks, 28 (8): 3729-3738 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Transmission with Covert Requirement in Untrusted Relaying Networks., , and . IST, page 670-675. IEEE, (2018)Covert Communications Versus Physical Layer Security., , , and . CoRR, (2018)Radio resource allocation in heterogeneous cellular networks based on effective capacity maximization: Perspective mobile data offloading., , , and . Trans. Emerg. Telecommun. Technol., (2017)Covert communication based on energy harvesting and cooperative jamming., , and . Wirel. Networks, 28 (8): 3729-3738 (2022)Robust Physical Layer Security for Power Domain Non-orthogonal Multiple Access-Based HetNets and HUDNs, SIC Avoidance at Eavesdroppers., , , and . CoRR, (2018)Robust Power Allocation in Covert Communication: Imperfect CDI., , , and . IEEE Trans. Veh. Technol., 70 (6): 5789-5802 (2021)Reduce impact of false detection of adversary states on the secure cooperative network., , and . IST, page 261-265. IEEE, (2016)Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens., , , and . IEEE Trans. Commun., 68 (6): 3737-3749 (2020)Robust Physical Layer Security for Power Domain Non-Orthogonal Multiple Access-Based HetNets and HUDNs: SIC Avoidance at Eavesdroppers., , , , and . IEEE Access, (2019)Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden., , , and . IEEE Internet Things J., 8 (9): 7170-7181 (2021)