Author of the publication

BIA for the K-User Interference Channel Using Reconfigurable Antenna at Receivers.

, and . IEEE Trans. Inf. Theory, 66 (4): 2184-2197 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiple Access Wire-tap Channel with Common Message., , , and . CoRR, (2014)An Optimal Transmission Policy for Energy Harvesting Systems with Continuous Energy and Data Arrivals., , , and . CoRR, (2015)On the Equivalency of Reliability and Security Metrics for Wireline Networks., , and . CoRR, (2016)Interference Alignment for the K-user Interference Channel with Imperfect CSI., and . CoRR, (2015)Statistical Performance Analysis of MDL Source Enumeration in Array Processing, , , and . CoRR, (2009)Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction., , and . IACR Cryptology ePrint Archive, (2016)JHAE: An Authenticated Encryption Mode Based on JH., , and . IACR Cryptology ePrint Archive, (2014)Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message., , , and . IEEE Trans. Inf. Forensics Secur., 11 (6): 1239-1251 (2016)A Fast Multiple-Source Detection and Localization Array Signal Processing Algorithm Using the Spatial Filtering and ML Approach., , , and . IEEE Trans. Signal Process., 55 (5-1): 1815-1827 (2007)Impossible differential attack on seven-round AES-128., and . IET Inf. Secur., 2 (2): 28-32 (2008)