Bahareh Akhbari

Orcid: 0000-0002-3199-0161

According to our database1, Bahareh Akhbari authored at least 41 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improving Privacy-Preserving Techniques for Smart Grid using Lattice-based Cryptography.
CoRR, 2024

Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming.
CoRR, 2024

2023
Secrecy performance analysis of IRS-NOMA systems.
EURASIP J. Wirel. Commun. Netw., December, 2023

Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions.
ISC Int. J. Inf. Secur., October, 2023

Shannon meets Stackelberg on the cognitive interference channel part I: A deterministic view.
Trans. Emerg. Telecommun. Technol., May, 2023

2022
Secrecy performance analysis of IRS-assisted D2D communication underlaying cellular network.
Phys. Commun., 2022

One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel.
ISC Int. J. Inf. Secur., 2022

Enhancing secrecy performance of energy harvesting NOMA systems using IoT user scheduling under untrusted users.
IET Commun., 2022

LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid.
Clust. Comput., 2022

2021
Change Detection in Electricity Consumption Patterns Utilizing Adaptive Information Theoretic Algorithms.
IEEE Syst. J., 2021

Bargaining solutions in heterogeneous networks: A reinforcement learning-based approach.
IET Commun., 2021

2020
Private Classical Information over a Quantum Multiple Access Channel: One-Shot Secrecy Rate Region.
Proceedings of the 10th International Symposium on Telecommunications, 2020

2019
Secure degrees of freedom of two-user X-channel with synergistic alternating channel state information at transmitters.
IET Inf. Secur., 2019

Classical-Quantum Multiple Access Wiretap Channel.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
LDPC codes over Gaussian multiple access wiretap channel.
IET Commun., 2018

Secrecy Sum-Rate Enhancement in the Interference Channel via Price-Based Power Splitting.
IEEE Commun. Lett., 2018

2016
Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message.
IEEE Trans. Inf. Forensics Secur., 2016

Multiple access channel with common message and secrecy constraint.
IET Commun., 2016

Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
Enhancing privacy of recent authentication schemes for low-cost RFID systems.
ISC Int. J. Inf. Secur., 2015

2014
Multiple Access Wire-tap Channel with Common Message.
CoRR, 2014

Random coding bound for E-capacity region of the relay channel with confidential messages.
Proceedings of the Iran Workshop on Communication and Information Theory, 2014

Privacy analysis and improvements of two recent RFID authentication protocols.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

Compound Multiple Access Channel with confidential messages.
Proceedings of the IEEE International Conference on Communications, 2014

2013
On the reliable transmission of correlated sources over two-relay network.
Proceedings of the 2013 IEEE Information Theory Workshop, 2013

2012
On the Capacity of Interference Channel With Causal and Noncausal Generalized Feedback at the Cognitive Transmitter.
IEEE Trans. Inf. Theory, 2012

Three-user cognitive interference channel: capacity region with strong interference.
IET Commun., 2012

On the Capacity of Interference Channel with Causal and Non-causal Generalized Feedback at the Cognitive Transmitter
CoRR, 2012

2011
Cooperative relay broadcast channels with partial causal channel state information.
IET Commun., 2011

Compress-and-Forward Strategy for Cognitive Interference Channel with Unlimited Look-Ahead.
IEEE Commun. Lett., 2011

Capacity bounds for multiple access-cognitive interference channel.
EURASIP J. Wirel. Commun. Netw., 2011

2010
Compress-and-forward strategy for relay channel with causal and non-causal channel state information.
IET Commun., 2010

Capacity regions for some classes of Causal Cognitive Interference Channels with delay.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

Achievable rate regions for Dirty Tape Channels and "joint writing on Dirty paper and Dirty Tape".
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

The capacity region of a class of Relay-Broadcast Channels and relay channels with three parallel unmatched subchannels.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Achievable rate regions for interference channel with two relays.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

State-Dependent Relay Channel with Private Messages with partial causal and non-causal Channel State Information.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Reliable source transmission over relay networks with Side Information.
Proceedings of the IEEE International Symposium on Information Theory, 2009

The capacity region of the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Cooperative relay-broadcast channels with causal Channel State Information.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Compress-and-forward strategy for the relay channel with non-causal State Information.
Proceedings of the IEEE International Symposium on Information Theory, 2009


  Loading...