Azadeh Sheikholeslami
Título
Citado por
Citado por
Ano
Physical layer security from inter-session interference in large wireless networks
A Sheikholeslami, D Goeckel, H Pishro-Nik, D Towsley
2012 Proceedings IEEE INFOCOM, 1179-1187, 2012
512012
Covert communication over classical-quantum channels
A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha
2016 IEEE International Symposium on Information Theory (ISIT), 2064-2068, 2016
382016
Multi-hop routing in covert wireless networks
A Sheikholeslami, M Ghaderi, D Towsley, BA Bash, S Guha, D Goeckel
IEEE Transactions on Wireless Communications 17 (6), 3656-3669, 2018
222018
Jamming-aware minimum energy routing in wireless networks
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
2014 IEEE International Conference on Communications (ICC), 2313-2318, 2014
202014
Energy-efficient routing in wireless networks in the presence of jamming
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
IEEE Transactions on Wireless Communications 15 (10), 6828-6842, 2016
182016
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver
A Sheikholeslami, D Goeckel, H Pishro-nik
Selected Areas in Communications, IEEE Journal on 31 (9), 1828 - 1839, 2013
172013
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy
A Sheikholeslami, D Goeckel, H Pishro-Nik
2013 IEEE International Symposium on Information Theory, 2950-2954, 2013
142013
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments
A Sheikholeslami, D Goeckel, H Pishro-Nik
IEEE Transactions on Wireless Communications, 2015
102015
Energy-efficient secrecy in wireless networks based on random jamming
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
IEEE Transactions on Communications 65 (6), 2522-2533, 2017
72017
2016 IEEE International Symposium on Information Theory (ISIT)
A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha
IEEE, 2016
62016
Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments
A Sheikholeslami, D Goeckel, H Pishro-Nik
2012 50th Annual Allerton Conference on Communication, Control, and …, 2012
62012
Everlasting Secrecy in Disadvantaged Wireless Environments against Sophisticated Eavesdroppers
A Sheikholeslami, D Goeckel, H Pishro-nik
Proceedings of 48th IEEE Asilomar Conference on Signals, Systems, and …, 2014
52014
Covert active sensing of linear systems
D Goeckel, BA Bash, A Sheikholeslami, S Guha, D Towsley
2017 51st Asilomar Conference on Signals, Systems, and Computers, 1692-1696, 2017
42017
Covert Communications in Packet Collision Channels
A Sheikholeslami, M Ghaderi, D Goeckel
2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2019
12019
Covert communications in a dynamic interference environment
D Goeckel, A Sheikholeslami, T Sobers, BA Bash, O Towsley, S Guha
2018 IEEE 19th International Workshop on Signal Processing Advances in …, 2018
12018
Everlasting secrecy in wireless communications: Challenges and approaches
D Goeckel, A Sheikholeslami, C Capar
2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), 1-4, 2014
12014
Covert Communications in Multi-Channel Slotted ALOHA Systems
A Sheikholeslami, M Ghaderi, D Goeckel
IEEE Transactions on Mobile Computing, 2020
2020
Everlasting Secrecy by Exploiting Eavesdropper’s Receiver Non-idealities
A Sheikholeslami
University of Massachusetts Libraries, 2016
2016
Minimum Energy Routing in Wireless Networks in the Presence of Jamming
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
arXiv preprint arXiv:1411.3736, 2014
2014
On the Impact of Dynamic Jamming on End-to-End Delay in Linear Wireless Networks
A Sheikholeslami, H Pishro-nik, M Ghaderi, D Goeckel
IEEE Conference of Information Science and Systems (CISS), Princeton, NJ, 2014
2014
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20