Shahid Mehraj Shah
Orcid: 0000-0002-8583-7904
According to our database1,
Shahid Mehraj Shah
authored at least 18 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Internet Things, April, 2024
An amalgamated correlation and regression based feature selection with ensemble learning approach for IoT network attack detection.
Internet Technol. Lett., 2024
Bayesian Game Formulation of Power Allocation in Multiple Access Wiretap Channel with Incomplete CSI.
Proceedings of the National Conference on Communications, 2024
2023
Achievable Sum-rate of variants of QAM over Gaussian Multiple Access Channel with and without security.
CoRR, 2023
2022
Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network.
CoRR, 2022
Unsupervised ensemble based deep learning approach for attack detection in IoT network.
Concurr. Comput. Pract. Exp., 2022
Proceedings of the International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems on International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2022
2020
Optimal rotation angle for finite constellation over additive white Gaussian noise multiple access wiretap channel.
IET Commun., 2020
2017
EURASIP J. Wirel. Commun. Netw., 2017
2016
Resource allocation in fading multiple access wiretap channel via game theoretic learning.
Proceedings of the 2016 Information Theory and Applications Workshop, 2016
2015
Mitigating Rate Loss in Fading Multiple Access Wiretap Channel to achieve Shannon Capacity Region.
CoRR, 2015
Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015
2013
Proceedings of the IEEE International Conference on Communications, 2013
2012
Proceedings of the IEEE International Conference on Communication Systems, 2012
2011
Achievable Secrecy Sum-Rate in a Fading MAC-WT with Power Control and without CSI of Eavesdropper
CoRR, 2011