Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation., , and . CoRR, (2016)Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel., and . IEEE Trans. Inf. Forensics Secur., (2022)Delay Performance of a Two-User Broadcast Channel with Security Constraints., , , and . GIIS, page 1-5. IEEE, (2018)Role of CSI in Short Packet Communication for Rayleigh Fading Z Interference Channel., and . GLOBECOM, page 3403-3408. IEEE, (2023)On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys., , , and . ISITA, page 663-667. IEEE, (2018)Outer Bounds on the Sum Rate of the K-User MIMO Gaussian Interference Channel., and . IEEE Trans. Commun., 61 (1): 176-186 (2013)Short-Packet Communication Over a Two-User Rayleigh Fading Z-Interference Channel: From Stability Region to the Age of Information., , and . IEEE Open J. Commun. Soc., (2023)Performance Analysis of the Wiretap Channel with a Friendly Jammer under Finite Blocklength., , and . GLOBECOM (Workshops), page 239-244. IEEE, (2022)Multiuser Cognitive Radio Networks: An Information Theoretic Perspective, , , and . CoRR, (2011)Performance analysis of congestion-aware secure broadcast channels., , , , and . EURASIP J. Wirel. Commun. Netw., 2021 (1): 178 (2021)