Resource allocation in fading multiple access wiretap channel via game theoretic learning

SM Shah, AK Chaitanya… - 2016 Information Theory …, 2016 - ieeexplore.ieee.org
In this paper we consider a K-user fading multiple access wiretap channel, where each user
wants to transmit a message confidentially. There is a passive eavesdropper (Eve) at the …

Secrecy rate region enhancement in multiple access wiretap channel

SM Shah - Journal of Telecommunications and Information …, 2022 - yadda.icm.edu.pl
It is commonly known that physical layer security is achieved with a trade-off in terms of the
achievable rate. Hence, security constraints generate rate losses in wiretap channels. To …

Achievable Sum-rate of variants of QAM over Gaussian Multiple Access Channel with and

S Showkat¹, ZB Dar¹, SM Shah - Proceedings of the International …, 2024 - books.google.com
The performance of next-generation wireless systems (5G/6G and beyond) at the physical
layer is primarily driven by the choice of digital modulation techniques that are bandwidth …

Bayesian Game Formulation of Power Allocation in Multiple Access Wiretap Channel with Incomplete CSI

B Rashid, M Haddad, SM Shah - 2024 National Conference on …, 2024 - ieeexplore.ieee.org
In this paper, we address the problem of distributed power allocation in a K user fading
multiple access wiretap channel, where global channel state information is limited, ie, each …

Achieving Shannon capacity region as secrecy rate region in a multiple access wiretap channel

SM Shah, V Sharma - 2015 IEEE Wireless Communications …, 2015 - ieeexplore.ieee.org
Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel
Page 1 Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap …

Deep Neural Network-Based Secure Energy-Efficient Power Allocation in an Interference Network

SM Shah, F Nassar, A Iftikhar, M Haddad… - … on Computing and …, 2023 - Springer
A general communication network can be modeled as an interference channel, wherein
multiple transmitters communicate with multiple receivers. With the inclusion of the Internet …

Resource allocation in a MAC with and without security via game theoretic learning

SM Shah, V Sharma - EURASIP Journal on Wireless Communications and …, 2017 - Springer
In this paper, we study a K-user fading multiple access channel (F-MAC), with and without
an eavesdropper (Eve). In the system without Eve, we assume that each user knows only its …

[PDF][PDF] Mitigating Rate Loss in Fading Multiple Access Wiretap Channel to achieve Shannon Capacity Region

SM Shah, V Sharma - arxiv preprint arxiv:1505.02085, 2015 - researchgate.net
Security constraint results in rate-loss in wiretap channels. In this paper we propose a
coding scheme for two user Multiple Access Channel with Wiretap (MAC-WT), where …

Enhancing Secrecy Rate Region for Recent Messages for a Slotted Multiple Access Wiretap Channel to Shannon Capacity Region

SM Shah, V Sharma - arxiv preprint arxiv:1505.02085, 2015 - arxiv.org
Security constraint results in\textit {rate-loss} in wiretap channels. In this paper we propose a
coding scheme for two user Multiple Access Channel with Wiretap (MAC-WT), where …