Author of the publication

Relaying for Multiuser Networks in the Absence of Codebook Information.

, and . IEEE Trans. Information Theory, 61 (3): 1247-1256 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Throughput maximizing games in the two-hop relay channel with energy cooperation., and . CISS, page 1-6. IEEE, (2015)Cost constrained spectrum sensing in cognitive radio networks., , and . CISS, page 1-6. IEEE, (2010)Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems., , , , , and . IEEE Trans. Information Forensics and Security, 6 (3-1): 521-522 (2011)Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming., and . IEEE Trans. Wireless Communications, 12 (1): 134-145 (2013)MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States., and . IEEE Trans. Information Theory, 60 (11): 6844-6869 (2014)Cooperation with an untrusted relay: a secrecy perspective., and . IEEE Trans. Information Theory, 56 (8): 3807-3827 (2010)MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom., , and . IEEE Trans. Communications, 62 (1): 246-255 (2014)Recruiting multi-antenna transmitters as cooperative jammers: An auction-theoretic approach., and . Allerton, page 1106-1112. IEEE, (2011)Quality-of-information aware transmission policies with time-varying links., and . MILCOM, page 230-235. IEEE, (2011)Operational information content sum capacity: Formulation and examples., , , and . FUSION, page 1-7. IEEE, (2011)