Select Publications
Preprints
2024, Demonstration of Photonics-based D-band Integrated Localization and Communication, http://dx.doi.org/10.48550/arxiv.2409.16885
,2024, Smart CSI Processing for Accruate Commodity WiFi-based Humidity Sensing, http://dx.doi.org/10.48550/arxiv.2409.07857
,2024, Optimal Reflection Coefficients for ASK Modulated Backscattering from Passive Tags, http://dx.doi.org/10.48550/arxiv.2406.17448
,2023, Jointly Optimal RIS Placement and Power Allocation for Underlay D2D Communications: An Outage Probability Minimization Approach, http://dx.doi.org/10.48550/arxiv.2312.13622
,2023, QoS Aware Transmit Beamforming for Secure Backscattering in Symbiotic Radio Systems, http://dx.doi.org/10.48550/arxiv.2310.18577
,2023, Smart Energy Borrowing and Relaying in Wireless Powered Networks: A Deep Reinforcement Learning Approach, http://dx.doi.org/10.20944/preprints202309.0476.v1
,2023, Joint Optimization of IRS Deployment and Passive Beamforming to Enhance the Received Power, http://dx.doi.org/10.48550/arxiv.2308.09788
,2023, Secrecy Outage Probability Analysis for Downlink NOMA with Imperfect SIC at Untrusted Users, http://dx.doi.org/10.48550/arxiv.2308.08811
,2023, Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error, http://dx.doi.org/10.48550/arxiv.2308.08804
,2023, Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices, http://dx.doi.org/10.48550/arxiv.2308.08800
,2023, Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization, http://dx.doi.org/10.48550/arxiv.2308.08813
,2023, User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMA, http://dx.doi.org/10.48550/arxiv.2308.08818
,2022, Privacy Preserving Release of Mobile Sensor Data, http://dx.doi.org/10.48550/arxiv.2205.06641
,2021, Circuit Characterization of IRS to Control Beamforming Design for Efficient Wireless Communication, http://arxiv.org/abs/2112.05944v1
,2021, Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users, http://dx.doi.org/10.48550/arxiv.2103.16814
,2021, Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective, http://dx.doi.org/10.48550/arxiv.2103.16503
,2021, Decoding Orders for Securing Untrusted NOMA, http://dx.doi.org/10.48550/arxiv.2103.16478
,2021, Secrecy Fairness Aware NOMA for Untrusted Users, http://dx.doi.org/10.48550/arxiv.2103.16463
,2019, Utility-Aware Optimal Resource Allocation Protocol for UAV-Assisted Small Cells with Heterogeneous Coverage Demands, http://dx.doi.org/10.48550/arxiv.1911.00821
,2019, Optimal Least-Squares Estimator and Precoder for Energy Beamforming over IQ-Impaired Channels, http://dx.doi.org/10.48550/arxiv.1906.10181
,2019, Utility Regions for DF Relay in OFDMA-based Secure Communication with Untrusted Users, http://dx.doi.org/10.48550/arxiv.1901.05177
,2019, OFDMA-based DF Secure Cooperative Communication with Untrusted Users, http://dx.doi.org/10.48550/arxiv.1901.03585
,2019, Subcarrier Pairing as Channel Gain Tailoring: Joint Resource Allocation for Relay-Assisted Secure OFDMA with Untrusted Users, http://dx.doi.org/10.48550/arxiv.1901.03637
,2019, Optimal Channel Estimation for Reciprocity-Based Backscattering with a Full-Duplex MIMO Reader, http://dx.doi.org/10.48550/arxiv.1901.03097
,2018, Energy Sustainable IoT with Individual QoS Constraints Through MISO SWIPT Multicasting, http://dx.doi.org/10.48550/arxiv.1805.08898
,2017, Energy-aware Mode Selection for Throughput Maximization in RF-Powered D2D Communications, http://dx.doi.org/10.48550/arxiv.1709.01755
,