Skip to main content

Showing 1–4 of 4 results for author: Bastami, H

.
  1. Secure SWIPT in the Multiuser STAR-RIS Aided MISO Rate Splitting Downlink

    Authors: Hamid Reza Hashempour, Hamed Bastami, Majid Moradikia, Seyed A. Zekavat, Hamid Behroozi, Gilberto Berardinelli, A. Lee Swindlehurst

    Abstract: Recently, simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) have emerged as a novel technology that provides 360 coverage and new degrees-of-freedom (DoFs). They are also capable of manipulating signal propagation and simultaneous wireless information and power transfer (SWIPT). This paper introduces a novel STAR-RIS-aided secure SWIPT system for downlink m… ▽ More

    Submitted 2 June, 2024; v1 submitted 16 November, 2022; originally announced November 2022.

    Comments: 16 pages, journal paper

  2. arXiv:2210.03926  [pdf, ps, other

    cs.IT eess.SP

    Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection

    Authors: Hamed Bastami, Majid Moradikia, Hamid Behroozi, Lajos Hanzo

    Abstract: The Cooperative Rate-Splitting (CRS) scheme, proposed evolves from conventional Rate Splitting (RS) and relies on forwarding a portion of the RS message by the relaying users. In terms of secrecy enhancement, it has been shown that CRS outperforms its non-cooperative counterpart for a two-user Multiple Input Single Output (MISO) Broadcast Channel (BC). Given the massive connectivity requirement of… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:1910.07843 by other authors

  3. arXiv:2209.12591  [pdf, ps, other

    cs.IT eess.SP

    Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel

    Authors: Hamed Bastami, Hamid Behroozi, Majid Moradikia, Ahmed Abdelhadi, Derrick Wing Kwan Ngand, Lajos Hanzo

    Abstract: UAVs are capable of improving the performance of next generation wireless systems. Specifically, UAVs can be exploited as aerial base-stations (UAV-BS) for supporting legitimate ground users in remote uncovered areas or in environments temporarily requiring high capacity. However, their communication performance is prone to both channel estimation errors and potential eavesdrop**. Hence, we inve… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

  4. arXiv:2101.02749  [pdf, other

    eess.SP

    Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning

    Authors: Hamed Bastami, Majid Moradikia, Hamid Behroozi, Rodrigo C. de Lamare, Ahmed Abdelhadi, Zhigou Ding

    Abstract: This paper investigates the physical layer security design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase reliability, we aim to protect the confidentiality of information against combined eavesdrop** attacks performed by both untrusted relay nodes and Eve. Taking int… ▽ More

    Submitted 7 January, 2021; originally announced January 2021.

    Comments: 31 pages, 17 figures