Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens M Forouzesh, P Azmi, A Kuhestani, PL Yeoh IEEE Transactions on Communications 68 (6), 3737-3749, 2020 | 90 | 2020 |
Covert communication using null space and 3D beamforming: Uncertainty of Willie's location information M Forouzesh, P Azmi, N Mokari, D Goeckel IEEE Transactions on Vehicular Technology 69 (8), 8568-8576, 2020 | 51 | 2020 |
Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden M Forouzesh, P Azmi, A Kuhestani, PL Yeoh IEEE Internet of Things Journal 8 (9), 7170-7181, 2020 | 42 | 2020 |
Robust power allocation in covert communication: Imperfect CDI M Forouzesh, P Azmi, N Mokari, D Goeckel IEEE Transactions on Vehicular Technology 70 (6), 5789-5802, 2021 | 24 | 2021 |
Simultaneous secure and covert transmissions against two attacks under practical assumptions M Forouzesh, FS Khodadad, P Azmi, A Kuhestani, H Ahmadi IEEE Internet of Things Journal 10 (12), 10160-10171, 2023 | 22 | 2023 |
Robust physical layer security for power domain non-orthogonal multiple access-based HetNets and HUDNs: SIC avoidance at eavesdroppers M Forouzesh, P Azmi, N Mokari, KK Wong, H Pishro-Nik IEEE Access 7, 107879-107896, 2019 | 17 | 2019 |
Covert communications versus physical layer security M Forouzesh, P Azmi, N Mokari, KK Wong arXiv preprint arXiv:1803.06608, 1803 | 15 | 1803 |
Secure transmission with covert requirement in untrusted relaying networks M Forouzesh, P Azmi, A Kuhestani 2018 9th International Symposium on Telecommunications (IST), 670-675, 2018 | 12 | 2018 |
Information-theoretic security or covert communication M Forouzesh, P Azmi, N Mokari, KK Wong, D Goeckel arXiv preprint arXiv:1803.06608, 2018 | 9 | 2018 |
Reduce impact of false detection of adversary states on the secure cooperative network M Forouzesh, P Azmi, N Mokari 2016 8th International Symposium on Telecommunications (IST), 261-265, 2016 | 7 | 2016 |
Resource Allocation in SCMA-based System M Moltafet, P Azmi, KALI KARIMI, M Foruzesh The Modares Journal of Electrical Engineering 15 (1), 9-14, 2015 | 6 | 2015 |
Deep learning aided secure transmission in wirelessly powered untrusted relaying in the face of hardware impairments V Shahiri, M Forouzesh, H Behroozi, A Kuhestani, KK Wong IEEE Open Journal of the Communications Society, 2024 | 4 | 2024 |
Covert communication using null space and 3D beamforming M Forouzesh, P Azmi, N Mokari, D Goeckel arXiv preprint arXiv:1907.01350, 2019 | 4 | 2019 |
Radio resource allocation in heterogeneous cellular networks based on effective capacity maximization: Perspective mobile data offloading MH Gholami, P Azmi, N Mokari, M Forouzesh Transactions on Emerging Telecommunications Technologies 28 (12), e3220, 2017 | 4 | 2017 |
4G to 5G migration through Core Network J Dadkhah Chimeh The Modares Journal of Electrical Engineering 16 (2), 11-14, 2016 | 4 | 2016 |
The analysis and design of secure wireless networks in the presence of users with different security needs based on covert communication and secure transmission of information … F Samsami Khodadad, P Baei, M Forouzesh, SM Asgari Tabatabaei Electronic and Cyber Defense 9 (4), 67-76, 2022 | 2 | 2022 |
Covert communication based on energy harvesting and cooperative jamming SF Azerang, F Samsami Khodadad, M Forouzesh Wireless Networks 28 (8), 3729-3738, 2022 | 1 | 2022 |
Secure beamforming in relay-aided HetNet with interference nulling M Jahandideh, P Azmi, N Mokari, M Forouzesh May, 2019 | 1 | 2019 |
Secure Full Duplex Communications in the Presence of Malicious Adversary M Foruzesh, P Azmi The Modares Journal of Electrical Engineering 16 (2), 32-37, 2016 | 1 | 2016 |
Covert communication in the presence of untrusted relay MR Yari, M Forouzesh, P Azmi Electronic and Cyber Defense 12 (2), 1-14, 2024 | | 2024 |