Multi-hop routing in covert wireless networks A Sheikholeslami, M Ghaderi, D Towsley, BA Bash, S Guha, D Goeckel IEEE Transactions on Wireless Communications 17 (6), 3656-3669, 2018 | 79 | 2018 |
Physical layer security from inter-session interference in large wireless networks A Sheikholeslami, D Goeckel, H Pishro-Nik, D Towsley 2012 Proceedings IEEE INFOCOM, 1179-1187, 2012 | 55 | 2012 |
Covert communication over classical-quantum channels A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha 2016 IEEE International Symposium on Information Theory (ISIT), 2064-2068, 2016 | 50 | 2016 |
Energy-efficient routing in wireless networks in the presence of jamming A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel IEEE Transactions on Wireless Communications 15 (10), 6828-6842, 2016 | 26 | 2016 |
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver A Sheikholeslami, D Goeckel, H Pishro-nik Selected Areas in Communications, IEEE Journal on 31 (9), 1828 - 1839, 2013 | 25 | 2013 |
Jamming-aware minimum energy routing in wireless networks A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel 2014 IEEE International Conference on Communications (ICC), 2313-2318, 2014 | 23 | 2014 |
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy A Sheikholeslami, D Goeckel, H Pishro-Nik 2013 IEEE International Symposium on Information Theory, 2950-2954, 2013 | 15 | 2013 |
Energy-efficient secrecy in wireless networks based on random jamming A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel IEEE Transactions on Communications 65 (6), 2522-2533, 2017 | 14 | 2017 |
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments A Sheikholeslami, D Goeckel, H Pishro-Nik IEEE Transactions on Wireless Communications, 2015 | 13 | 2015 |
Covert active sensing of linear systems D Goeckel, BA Bash, A Sheikholeslami, S Guha, D Towsley 2017 51st Asilomar Conference on Signals, Systems, and Computers, 1692-1696, 2017 | 12 | 2017 |
Covert communications in a dynamic interference environment D Goeckel, A Sheikholeslami, T Sobers, BA Bash, O Towsley, S Guha 2018 IEEE 19th International Workshop on Signal Processing Advances in …, 2018 | 11 | 2018 |
2016 IEEE International Symposium on Information Theory (ISIT) A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha IEEE, 2016 | 9 | 2016 |
A family of pairwise multi-marginal optimal transports that define a generalized metric L Mi, A Sheikholeslami, J Bento Machine Learning 112 (1), 353-384, 2023 | 6 | 2023 |
Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments A Sheikholeslami, D Goeckel, H Pishro-Nik 2012 50th Annual Allerton Conference on Communication, Control, and …, 2012 | 6 | 2012 |
Covert communications in multi-channel slotted ALOHA systems A Sheikholeslami, M Ghaderi, D Goeckel IEEE Transactions on Mobile Computing 21 (6), 1958-1971, 2020 | 5 | 2020 |
Everlasting Secrecy in Disadvantaged Wireless Environments against Sophisticated Eavesdroppers A Sheikholeslami, D Goeckel, H Pishro-nik Proceedings of 48th IEEE Asilomar Conference on Signals, Systems, and …, 2014 | 5 | 2014 |
Covert communication over classical-quantum channels MS Bullock, A Sheikholeslami, M Tahmasbi, RC Macdonald, S Guha, ... | 2 | 2023 |
Covert communications in packet collision channels A Sheikholeslami, M Ghaderi, D Goeckel 2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2019 | 2 | 2019 |
Everlasting secrecy in wireless communications: Challenges and approaches D Goeckel, A Sheikholeslami, C Capar 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), 1-4, 2014 | 1 | 2014 |
On the Impact of Dynamic Jamming on End-to-End Delay in Linear Wireless Networks A Sheikholeslami, H Pishro-nik, M Ghaderi, D Goeckel IEEE Conference of Information Science and Systems (CISS), Princeton, NJ, 2014 | 1 | 2014 |