Author of the publication

Secure wireless communications via cooperative relaying and jamming.

, , , and . GLOBECOM Workshops, page 849-853. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cascading effects in interdependent networks., , and . IEEE Network, 28 (4): 82-87 (2014)From social trust assisted reciprocity (STAR) to utility-optimal mobile crowdsensing., , , and . GlobalSIP, page 742-745. IEEE, (2014)Information diffusion in overlaying social-physical networks., , , and . CISS, page 1-6. IEEE, (2012)Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Efficient Approximations., , , , and . SECON, page 323-331. IEEE, (2010)Capacity bounds and power allocation for wireless relay channels., and . IEEE Trans. Information Theory, 51 (6): 2020-2040 (2005)On the capacity of MIMO relay channels., , and . IEEE Trans. Information Theory, 51 (1): 29-43 (2005)Arbitrary source models and Bayesian codebooks in rate-distortion theory., and . IEEE Trans. Information Theory, 48 (8): 2276-2290 (2002)Achievable Rates and Scaling Laws of Power-Constrained Wireless Sensory Relay Networks., , and . IEEE Trans. Information Theory, 52 (9): 4084-4104 (2006)Target Detection in Bistatic Radar Networks: Node Placement and Repeated Security Game., , , and . IEEE Trans. Wireless Communications, 12 (3): 1279-1289 (2013)A two-phase utility maximization framework for wireless medium access control., and . IEEE Trans. Wireless Communications, 6 (12): 4299-4207 (2007)