Author of the publication

To avoid or not to avoid CSI leakage in physical layer secret communication systems.

, , , , and . IEEE Communications Magazine, 53 (12): 19-25 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How much training is enough for secrecy beamforming with artificial noise., , , and . ICC, page 4782-4787. IEEE, (2012)SoftAir: A software defined networking architecture for 5G wireless systems., , and . Computer Networks, (2015)Jointly optimized QoS-aware virtualization and routing in software defined networks., , and . Computer Networks, (2016)Distributed Cross-Layer Protocol Design for Magnetic Induction Communication in Wireless Underground Sensor Networks., , , and . IEEE Trans. Wireless Communications, 14 (7): 4006-4019 (2015)Cognitive and Opportunistic Relay for QoS Guarantees in Machine-to-Machine Communications., and . IEEE Trans. Mob. Comput., 15 (3): 599-609 (2016)Towards Optimal Network Planning for Software-Defined Networks., , , and . IEEE Trans. Mob. Comput., 17 (12): 2953-2967 (2018)SoftWater: Software-defined networking for next-generation underwater communication systems., , and . Ad Hoc Networks, (2016)Cognitive radio in slow fading channels with partial channel state information at the transmitter., , , and . CISS, page 219-224. IEEE, (2008)On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT., and . IEEE Trans. Information Forensics and Security, 8 (2): 414-419 (2013)Cognitive Radio with Partial Channel State Information at the Transmitter., , , and . IEEE Trans. Wireless Communications, 9 (11): 3402-3413 (2010)