Search Results - "Kuhestani, Ali"

Refine Results
  1. 1

    Can a multi-hop link relying on untrusted amplify-and-forward relays render security? by Mamaghani, Milad Tatar, Kuhestani, Ali, Behroozi, Hamid

    Published in Wireless networks (2021)
    “…Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things. However, sometimes due…”
    Get full text
    Journal Article
  2. 2

    Characterization of untrusted relaying networks in the presence of an adversary jammer by Saedi, Hamed, Mohammadi, Abbas, Kuhestani, Ali

    Published in Wireless networks (01-04-2020)
    “…By considering an adversary jammer in a communication network, we investigate the secrecy performance of a cooperative wireless network comprised of a source,…”
    Get full text
    Journal Article
  3. 3

    Adversarial Neural Network Training for Secure and Robust Brain-to-Brain Communication by Ahmadi, Hossein, Kuhestani, Ali, Mesin, Luca

    Published in IEEE access (2024)
    “…In the rapidly evolving domain of brain-to-brain communication, safeguarding the transmission of information against adversarial threats is paramount. This…”
    Get full text
    Journal Article
  4. 4

    A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer by Letafati, Mehdi, Kuhestani, Ali, Wong, Kai-Kit, Piran, Md. Jalil

    Published in IEEE internet of things journal (15-03-2021)
    “…In this article, we propose a lightweight security scheme for ensuring both information confidentiality and transmission resiliency in the Internet-of-Things…”
    Get full text
    Journal Article
  5. 5

    Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments by Moradikia, Majid, Bastami, Hamed, Kuhestani, Ali, Behroozi, Hamid, Hanzo, Lajos

    Published in IEEE access (2019)
    “…In this work, by considering a variety of realistic hardware impairments, we aim to enhance the security of a cooperative relaying network, where a source…”
    Get full text
    Journal Article
  6. 6

    Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments by Shahiri, Vahid, Forouzesh, Moslem, Behroozi, Hamid, Kuhestani, Ali, Wong, Kai-Kit

    “…Limited power and computational resources make the employment of complex classical encryption schemes unrealistic in resource-limited networks, e.g., the…”
    Get full text
    Journal Article
  7. 7

    Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers by Kuhestani, Ali, Mohammadi, Abbas, Mohammadi, Mohammadali

    “…In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to enhance the physical layer security of a cooperative network, where a…”
    Get full text
    Journal Article
  8. 8

    Three-Hop Untrusted Relay Networks with Hardware Imperfections and Channel Estimation Errors for Internet of Things by Letafati, Mehdi, Kuhestani, Ali, Behroozi, Hamid

    “…Cooperative relaying can be introduced as a promising approach for data communication in the Internet of Things (IoT), where the source and the destination may…”
    Get full text
    Journal Article
  9. 9

    RIS-Aided Secure Millimeter-Wave Communication Under RF-Chain Impairments by Ragheb, Mohammad, Kuhestani, Ali, Kazemi, Mohammad, Ahmadi, Hossein, Hanzo, Lajos

    Published in IEEE transactions on vehicular technology (01-01-2024)
    “…The effects of hardware impairments (HWIs) on the secrecy performance of a reconfigurable intelligent surface (RIS)-assisted millimeter wave system are…”
    Get full text
    Journal Article
  10. 10

    Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens by Forouzesh, Moslem, Azmi, Paeiz, Kuhestani, Ali, Yeoh, Phee Lep

    Published in IEEE transactions on communications (01-06-2020)
    “…In this paper, we address the problem of joint covert communication and secure transmission in untrusted relaying networks when multiple wardens exist in the…”
    Get full text
    Journal Article
  11. 11

    Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer by Kuhestani, Ali, Mohammadi, Abbas, Yeoh, Phee Lep

    Published in IEEE transactions on communications (01-06-2018)
    “…In this paper, we examine the secrecy performance of two-way relaying between a large-scale multiple antenna base station (BS) and a single antenna mobile user…”
    Get full text
    Journal Article
  12. 12

    Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay by Letafati, Mehdi, Kuhestani, Ali, Behroozi, Hamid, Ng, Derrick Wing Kwan

    “…In this paper, we propose a light-weight jamming-resistant scheme for the Internet-of-Things (IoT) in 5G networks to ensure high-quality communication in a…”
    Get full text
    Journal Article
  13. 13

    Secure communication with a multiple-antennas untrusted relay in presence of randomly distributed adversary jammers by Saedi, Hamed, Mohammadi, Abbas, Kuhestani, Ali

    Published in Physical communication (01-10-2024)
    “…In this article, we examine the achievable secrecy rate of a cooperative network including one source, one destination, and one untrusted amplify-and-forward…”
    Get full text
    Journal Article
  14. 14

    Short-Packet Amplify-and-Forward Relaying for the Internet-of-Things in the Face of Imperfect Channel Estimation and Hardware Impairments by Shahiri, Vahid, Kuhestani, Ali, Hanzo, Lajos

    “…In next-generation wireless systems ultra-reliable low-latency communications (URLLC) have to be realized in support of the Internet-of-things (IoT). However,…”
    Get full text
    Journal Article
  15. 15

    Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer by Tatar Mamaghani, Milad, Kuhestani, Ali, Wong, Kai-Kit

    Published in IEEE transactions on vehicular technology (01-09-2018)
    “…In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless-powered untrusted…”
    Get full text
    Journal Article
  16. 16

    A new practical physical layer secret key generation in the presence of an untrusted relay by Keshavarzi, Mohammadreza, Zayyani, Hadi, Kuhestani, Ali, Ahmadi, Hossein

    Published in Physical communication (01-10-2024)
    “…Physical layer secret key generation (SKG) has recently been introduced as a lightweight and efficient solution for sixth-generation (6G) networks. In this…”
    Get full text
    Journal Article
  17. 17

    A machine learning multi-hop physical layer authentication with hardware impairments by Ezzati Khatab, Zahra, Mohammadi, Abbas, Pourahmadi, Vahid, Kuhestani, Ali

    Published in Wireless networks (01-04-2024)
    “…Authentication is one of the major requirements of wireless networks security, which uses to distinguish legal transmitter from illegal transmitter. Physical…”
    Get full text
    Journal Article
  18. 18

    Reconfigurable-Intelligent-Surface-Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments by Shahiri, Vahid, Behroozi, Hamid, Kuhestani, Ali, Wong, Kai-Kit

    Published in IEEE internet of things journal (01-05-2024)
    “…Physical-layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by efficiently providing secret keys in…”
    Get full text
    Journal Article
  19. 19

    On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach by Ragheb, Mohammad, Hemami, S. Mostafa Safavi, Kuhestani, Ali, Ng, Derrick Wing Kwan, Hanzo, Lajos

    “…The physical layer security (PLS) of millimeter wave (mmWave) communication systems is investigated, where the secure source-to-destination communication is…”
    Get full text
    Journal Article
  20. 20

    Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden by Forouzesh, Moslem, Azmi, Paeiz, Kuhestani, Ali, Yeoh, Phee Lep

    Published in IEEE internet of things journal (01-05-2021)
    “…In this article, we investigate joint information-theoretic secrecy and covert communication in a single-input-multioutput (SIMO) system where a transmitter…”
    Get full text
    Journal Article