Skip to main content

Showing 1–6 of 6 results for author: Moradikia, M

Searching in archive cs. Search in all archives.
.
  1. Secure SWIPT in the Multiuser STAR-RIS Aided MISO Rate Splitting Downlink

    Authors: Hamid Reza Hashempour, Hamed Bastami, Majid Moradikia, Seyed A. Zekavat, Hamid Behroozi, Gilberto Berardinelli, A. Lee Swindlehurst

    Abstract: Recently, simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) have emerged as a novel technology that provides 360 coverage and new degrees-of-freedom (DoFs). They are also capable of manipulating signal propagation and simultaneous wireless information and power transfer (SWIPT). This paper introduces a novel STAR-RIS-aided secure SWIPT system for downlink m… ▽ More

    Submitted 2 June, 2024; v1 submitted 16 November, 2022; originally announced November 2022.

    Comments: 16 pages, journal paper

  2. arXiv:2210.03926  [pdf, ps, other

    cs.IT eess.SP

    Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection

    Authors: Hamed Bastami, Majid Moradikia, Hamid Behroozi, Lajos Hanzo

    Abstract: The Cooperative Rate-Splitting (CRS) scheme, proposed evolves from conventional Rate Splitting (RS) and relies on forwarding a portion of the RS message by the relaying users. In terms of secrecy enhancement, it has been shown that CRS outperforms its non-cooperative counterpart for a two-user Multiple Input Single Output (MISO) Broadcast Channel (BC). Given the massive connectivity requirement of… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:1910.07843 by other authors

  3. arXiv:2209.12591  [pdf, ps, other

    cs.IT eess.SP

    Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel

    Authors: Hamed Bastami, Hamid Behroozi, Majid Moradikia, Ahmed Abdelhadi, Derrick Wing Kwan Ngand, Lajos Hanzo

    Abstract: UAVs are capable of improving the performance of next generation wireless systems. Specifically, UAVs can be exploited as aerial base-stations (UAV-BS) for supporting legitimate ground users in remote uncovered areas or in environments temporarily requiring high capacity. However, their communication performance is prone to both channel estimation errors and potential eavesdrop**. Hence, we inve… ▽ More

    Submitted 26 September, 2022; originally announced September 2022.

  4. arXiv:2205.15743  [pdf, other

    cs.LG cs.AI cs.NI

    Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks

    Authors: Eyad Shtaiwi, Ahmed El Ouadrhiri, Majid Moradikia, Salma Sultana, Ahmed Abdelhadi, Zhu Han

    Abstract: Automatic modulation classification (AMC) using the Deep Neural Network (DNN) approach outperforms the traditional classification techniques, even in the presence of challenging wireless channel environments. However, the adversarial attacks cause the loss of accuracy for the DNN-based AMC by injecting a well-designed perturbation to the wireless channels. In this paper, we propose a novel generat… ▽ More

    Submitted 29 May, 2022; originally announced May 2022.

  5. Secure mm-Wave Communications with Imperfect Hardware and Uncertain Eavesdropper Location

    Authors: Saeed Mashdour, Majid Moradikia, Phee Lep Yeoh

    Abstract: This paper examines the secrecy performance of millimeter-wave (mm-Wave) communications with imperfect hardware and uncertain eavesdropper location. We consider a multiple-antenna source communicating with a single-antenna destination using masked beamforming to transmit the information signals with artificial noise (AN) in the presence of a passive eavesdropper (Eve). For this system, we derive n… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

    Journal ref: Transactions on Emerging Telecommunications Technologies. 2020

  6. arXiv:1709.01334  [pdf, ps, other

    cs.CR cs.IT

    Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks

    Authors: Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad Ruhul Amin Khandaker

    Abstract: By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA)… ▽ More

    Submitted 5 September, 2017; originally announced September 2017.

    Comments: 29 pages, 7 figures, Submitted to IEEE Transactions on Wireless Communications