Zohaib Hassan Awan
YOU?
Author Swipe
View article: Secrecy Rate Region of SWIPT Wiretap Interference Channels
Secrecy Rate Region of SWIPT Wiretap Interference Channels Open
The secrecy rate region of wiretap interference channels with a multi-antenna passive eavesdropper is studied under receiver energy harvesting constraints. To stay operational in the network, the legitimate receivers demand energy alongsid…
View article: On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT
On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT Open
We study the problem of secure transmission over a Gaussian multi-input single-output (MISO) two receiver channel with an external eavesdropper, under the assumption that the state of the channel which is available to each receiver is conv…
View article: Cloud Radio Access Networks with Coded Caching
Cloud Radio Access Networks with Coded Caching Open
A cloud radio access network (C-RAN) is considered as a candidate to meet the expectations of higher data rate de- mands in wireless networks. In C-RAN, low energy base stations (BSs) are deployed over a small geography and are allowed to …
View article: Full-duplex vs. half-duplex secret-key generation
Full-duplex vs. half-duplex secret-key generation Open
Full-duplex (FD) communication is regarded as a key technology in future 5G and Internet of Things (IoT) systems. In addition to high data rate constraints, the success of these systems depends on the ability to allow for confidentiality a…
View article: Interplay Between Delayed CSIT and Network Topology for Secure MISO BC
Interplay Between Delayed CSIT and Network Topology for Secure MISO BC Open
We study the problem of secure transmission over a Gaussian two-user multi-input single-output (MISO) broadcast channel under the assumption that links connecting the transmitter to the two receivers may have unequal strength statistically…
View article: On MISO Broadcast Channel With Alternating CSIT and Secrecy Constraints
On MISO Broadcast Channel With Alternating CSIT and Secrecy Constraints Open
We study the problem of secure transmission over a two-user Gaussian multi-input single-output (MISO) broadcast channel under the assumption that the state of the channel to each receiver is conveyed either perfectly (P) or with delay (D) …