Ali Kuhestani

Orcid: 0000-0002-2767-2603

According to our database1, Ali Kuhestani authored at least 41 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reconfigurable-Intelligent-Surface-Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments.
IEEE Internet Things J., May, 2024

A machine learning multi-hop physical layer authentication with hardware impairments.
Wirel. Networks, April, 2024

RIS-Aided Secure Millimeter-Wave Communication Under RF-Chain Impairments.
IEEE Trans. Veh. Technol., January, 2024

Secure communication with a multiple-antennas untrusted relay in presence of randomly distributed adversary jammers.
Phys. Commun., 2024

A new practical physical layer secret key generation in the presence of an untrusted relay.
Phys. Commun., 2024

Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments.
IEEE Open J. Commun. Soc., 2024

Adversarial Neural Network Training for Secure and Robust Brain-to-Brain Communication.
IEEE Access, 2024

A Novel Group Secret Key Generation: Performance Analysis and Secrecy Improvement.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

2023
Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions.
IEEE Internet Things J., 2023

2022
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach.
IEEE Trans. Inf. Forensics Secur., 2022

Short-Packet Amplify-and-Forward Relaying for the Internet-of-Things in the Face of Imperfect Channel Estimation and Hardware Impairments.
IEEE Trans. Green Commun. Netw., 2022

2021
Can a multi-hop link relying on untrusted amplify-and-forward relays render security?
Wirel. Networks, 2021

A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer.
IEEE Internet Things J., 2021

Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden.
IEEE Internet Things J., 2021

2020
Characterization of untrusted relaying networks in the presence of an adversary jammer.
Wirel. Networks, 2020

Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay.
IEEE Trans. Wirel. Commun., 2020

Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2020

Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens.
IEEE Trans. Commun., 2020

A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Physical Layer Secrecy and Transmission Resiliency of Device-to-Device Communications.
Proceedings of the IEEE Global Communications Conference, 2020

2019
A new secure multi-hop untrusted relaying scheme.
CoRR, 2019

Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments.
IEEE Access, 2019

2018
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks.
IEEE Trans. Wirel. Commun., 2018

Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer.
IEEE Trans. Veh. Technol., 2018

Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers.
IEEE Trans. Inf. Forensics Secur., 2018

Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer.
IEEE Trans. Commun., 2018

Security-reliability trade-off in cyber-physical cooperative systems with non-ideal untrusted relaying.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Secure Transmission with Covert Requirement in Untrusted Relaying Networks.
Proceedings of the 9th International Symposium on Telecommunications, 2018

2017
Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network.
IET Commun., 2017

Energy Harvesting Based Secure Two-Way Communication Using an Untrusted Relay.
CoRR, 2017

Secure Two-Way Communication via a Wireless Powered Untrusted Relay and Friendly Jammer.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network.
IET Networks, 2016

EE-RS and PA for untrusted relay network at high signal-to-noise ratio regime.
IET Commun., 2016

Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay.
IET Commun., 2016

Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: resource allocation and performance study.
IET Commun., 2016

2015
Diversity-multiplexing trade-off of linear dispersion coded multi-input-multi-output systems.
IET Commun., 2015

2014
Simply decoded efficient full-rate space-time block codes over correlated Rician fading channels.
IET Commun., 2014

Finite-SNR diversity-multiplexing tradeoff of linear dispersion coded MISO systems.
Proceedings of the Iran Workshop on Communication and Information Theory, 2014

2013
Design of efficient full-rate linear dispersion spacetime block codes over correlated fading channels.
IET Commun., 2013

2012
Efficient full-rate LDCs in correlated Rician fading channel with decoupled decoder.
Proceedings of the 6th International Symposium on Telecommunications, 2012


  Loading...