• Publications
  • Influence
Bounds on Secrecy Capacity Over Correlated Ergodic Fading Channels at High SNR
tl;dr
We investigate the secrecy capacity of an ergodic fading wiretap channel when the main and eavesdropper channels are correlated and investigate its behavior in the high signal-to-noise ratio (SNR) regime. Expand
  • 98
  • 12
Autonomous Distributed Power Control for Cognitive Radio Networks
tl;dr
We propose an autonomous distributed power control scheme for CR networks that considers the QoS requirements of the PU and the SU simultaneously. Expand
  • 39
  • 7
Open Access
Discrete Wavelet Packet Transform based Energy Detector for Cognitive Radios
tl;dr
We propose the fast spectrum sensing algorithm using the discrete wavelet packet transform (DWPT) and infinite impulse response (IIR) polyphase filtering schemes. Expand
  • 54
  • 6
Open Access
Optimization of multi-cluster multi-group based cooperative sensing in cognitive radio networks
tl;dr
In cognitive radio (CR) networks, there are two parameters associated with spectrum sensing: probability of detection (PoD) and probability of false alarm (PoF) and the performance of these two parameters depends heavily on the fusion scheme. Expand
  • 17
  • 6
Enhanced Binary Search with Time-Divided Responses for Efficient RFID Tag Anti-Collision
tl;dr
This paper proposes bi-slotted tree based tag anti-collision protocols, which reduce both prefix overhead and iteration overhead for fast tag identification. Expand
  • 24
  • 5
Open Access
Robust Localization with Unknown Transmission Power for Cognitive Radio
tl;dr
We propose a constrained optimization method to estimate transmission power and position without prior information of transmission power. Expand
  • 77
  • 4
Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks
tl;dr
In wireless sensor networks (WSNs), security and energy consumption have been considered as long-lasting technical challenges as sensors usually suffer from complexity. Expand
  • 32
  • 3
Robust Transmission Power and Position Estimation in Cognitive Radio
tl;dr
The transmission power and position of the primary user in cognitive radio(CR) is very precious information because these information of theprimary user determines the spatial resource. Expand
  • 21
  • 3
Open Access
On multiuser secrecy rate in flat fading channel
tl;dr
We consider a physical layer security based on the wiretap channel for wireless communication systems in which there are one transmitter and multiple receivers/users who report their channel state information (CSI) to the transmitter, to get useful insights, we consider a fixed transmit power case. Expand
  • 17
  • 3
Secure Type-Based Multiple Access
tl;dr
We consider data confidentiality in a distributed detection scenario with a type-based multiple-access (TBMA) protocol where a large set of sensors sends local measurements to an ally fusion center (FC) over an insecure wireless medium. Expand
  • 18
  • 3
Open Access