Somayeh Salimi
According to our database1,
Somayeh Salimi
authored at least 37 papers
between 2009 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
0
1
2
3
4
5
6
7
8
1
1
2
1
1
4
4
1
1
2
1
4
1
3
3
2
3
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
CoRR, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
2019
Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking.
Proceedings of the 17th European Control Conference, 2019
2017
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
Preserving confidentiality in the Gaussian broadcast channel using compute-and-forward.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
2016
CoRR, 2016
Security in the Gaussian interference channel: Weak and moderately weak interference regimes.
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
CoRR, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocation.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015
2014
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014
2013
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback.
IEEE J. Sel. Areas Commun., 2013
High SNR performance of amplify-and-forward relaying in Rayleigh fading wiretap channels.
Proceedings of the Iran Workshop on Communication and Information Theory, 2013
Pairwise Key Agreement over a Generalized Multiple Access Channel: Capacity Bounds and Game-Theoretic Analysis.
Proceedings of the ISWCS 2013, 2013
Proceedings of the ISWCS 2013, 2013
2012
IET Inf. Secur., 2012
Secret key agreement using correlated sources over the generalized multiple access channel.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
Proceedings of the 2012 International Symposium on Wireless Communication Systems (ISWCS), 2012
Layered LDPC convolutional codes for compression of correlated sources under adversarial attacks.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Analysis of an adjacent 3G network corruption influence on WLAN/3G interworking access.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011
2010
IET Inf. Secur., 2010
IET Commun., 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
2009
Proceedings of the 2009 Wireless Telecommunications Symposium, 2009
Proceedings of the Information Security Practice and Experience, 2009