Parthajit Mohapatra

Orcid: 0000-0002-7085-0030

According to our database1, Parthajit Mohapatra authored at least 37 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure Status Updates under Eavesdropping: Age of Information-based Secrecy Metrics.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Short-Packet Communication Over a Two-User Rayleigh Fading Z-Interference Channel: From Stability Region to the Age of Information.
IEEE Open J. Commun. Soc., 2023

Deep Reinforcement Learning for Power Control in Secure Broadcast Channels.
Proceedings of the 21st International Symposium on Modeling and Optimization in Mobile, 2023

Short Packet Communication over 2-user Non-orthogonal Multiple Access Channel with Confidential Message.
Proceedings of the 28th National Conference on Communications, 2023

Role of CSI in Short Packet Communication for Rayleigh Fading Z Interference Channel.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Design and Performance Analysis of Intra-Vehicle VLC System With Random Receiver Orientation.
IEEE Trans. Intell. Transp. Syst., 2022

Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel.
IEEE Trans. Inf. Forensics Secur., 2022

Performance Analysis of a MIMO System With Bursty Traffic in the Presence of Energy Harvesting Jammer.
IEEE Trans. Green Commun. Netw., 2022

Secure Communication Over 2-User Gaussian Interference Channel with Caching.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Performance Analysis of the Wiretap Channel with a Friendly Jammer under Finite Blocklength.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

Short Packet Communication over a Two-user Z-Interference Channel with Rayleigh Fading.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Performance analysis of congestion-aware secure broadcast channels.
EURASIP J. Wirel. Commun. Netw., 2021

On the Secrecy Capacity of 2-user Gaussian Z-Interference Channel with Shared Key.
CoRR, 2021

Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints.
IEEE Access, 2021

Secrecy in Congestion-Aware Broadcast Channels.
Proceedings of the 2021 Wireless Days, 2021

2020
Delay Performance of a Two-User Broadcast Channel with Security Constraints.
SN Comput. Sci., 2020

Secrecy Performance of an Artificial Noise Assisted Transmission Scheme With Active Eavesdropper.
IEEE Commun. Lett., 2020

Secure Status Updates under Eavesdropping: Age of Information-based Physical Layer Security Metrics.
CoRR, 2020

Mitigating Jamming Attacks in a MIMO System with Bursty Traffic.
Proceedings of the 2020 National Conference on Communications, 2020

2019
Performance Evaluation of MIMO Modulation Schemes for Indoor VLC Channels with Angular Detectors.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Wireless Caching Helper System with Heterogeneous Traffic and Secrecy Constraints.
Proceedings of the 20th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2019

2018
Secure Communications for the Two-User Broadcast Channel With Random Traffic.
IEEE Trans. Inf. Forensics Secur., 2018

On the Secrecy Capacity of 2-user Gaussian Interference Channel with Independent Secret Keys.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
On the Secrecy Capacity Region of the Two-User Symmetric Z Interference Channel With Unidirectional Transmitter Cooperation.
IEEE Trans. Inf. Forensics Secur., 2017

2016
On the Capacity of the Two-User Symmetric Interference Channel With Transmitter Cooperation and Secrecy Constraints.
IEEE Trans. Inf. Theory, 2016

Outer Bounds on the Secrecy Capacity Region of the 2-user Z Interference Channel With Unidirectional Transmitter Cooperation.
CoRR, 2016

On the Secrecy Capacity Region of the 2-user Z Interference Channel with Unidirectional Transmitter Cooperation.
CoRR, 2016

Stability region of two-user full-duplex broadcast channel with secrecy constraint.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Capacity of the deterministic z-interference channel with unidirectional transmitter cooperation and secrecy constraints.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
The Role of Limited Transmitter Cooperation in Secure Communication over the Interference Channel.
CoRR, 2014

Outer bounds on the secrecy rate of the 2-user symmetric deterministic interference channel with transmitter cooperation.
Proceedings of the Twentieth National Conference on Communications, 2014

2013
Inner Bound on the GDOF of the K-User MIMO Gaussian Symmetric Interference Channel.
IEEE Trans. Commun., 2013

Outer Bounds on the Sum Rate of the K-User MIMO Gaussian Interference Channel.
IEEE Trans. Commun., 2013

Secrecy in the 2-user symmetric deterministic interference channel with transmitter cooperation.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

2011
Interference Alignment Algorithms for the K User Constant MIMO Interference Channel.
IEEE Trans. Signal Process., 2011

Multiuser Cognitive Radio Networks: An Information Theoretic Perspective
CoRR, 2011

On the generalized degrees of freedom of the K-user symmetric MIMO Gaussian interference channel.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011


  Loading...