Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Device-to-Device Coded-Caching With Distinct Cache Sizes., , and . IEEE Trans. Commun., 68 (5): 2748-2762 (2020)Coded Caching for Heterogeneous Systems: An Optimization Perspective., , and . IEEE Trans. Commun., 67 (8): 5321-5335 (2019)Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming., and . IEEE Trans. Wirel. Commun., 12 (1): 134-145 (2013)Distributed power allocation strategies for parallel relay networks., , and . IEEE Trans. Wirel. Commun., 7 (2): 552-561 (2008)Energy Harvesting Networks With Energy Cooperation: Procrastinating Policies., and . IEEE Trans. Commun., 63 (11): 4525-4538 (2015)Throughput Maximization for Two-Way Relay Channels With Energy Harvesting Nodes: The Impact of Relaying Strategies., , and . IEEE Trans. Commun., 63 (6): 2081-2093 (2015)Secure Integrated Sensing and Communication under Correlated Rayleigh Fading., , , , and . IACR Cryptol. ePrint Arch., (2024)Beyond Transmitting Bits: Context, Semantics, and Task-Oriented Communications., , , , , , , and . CoRR, (2022)Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems., , , and . Cybersecur., (December 2022)Quality-of-information aware transmission policies with time-varying links., and . MILCOM, page 230-235. IEEE, (2011)