Follow
moslem forouzesh
moslem forouzesh
Amol University of Special Modern Technologies
Verified email at ausmt.ac.ir
Title
Cited by
Cited by
Year
Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens
M Forouzesh, P Azmi, A Kuhestani, PL Yeoh
IEEE Transactions on Communications 68 (6), 3737-3749, 2020
912020
Covert communication using null space and 3D beamforming: Uncertainty of Willie's location information
M Forouzesh, P Azmi, N Mokari, D Goeckel
IEEE Transactions on Vehicular Technology 69 (8), 8568-8576, 2020
512020
Joint information-theoretic secrecy and covert communication in the presence of an untrusted user and warden
M Forouzesh, P Azmi, A Kuhestani, PL Yeoh
IEEE Internet of Things Journal 8 (9), 7170-7181, 2020
432020
Simultaneous secure and covert transmissions against two attacks under practical assumptions
M Forouzesh, FS Khodadad, P Azmi, A Kuhestani, H Ahmadi
IEEE Internet of Things Journal 10 (12), 10160-10171, 2023
242023
Robust power allocation in covert communication: Imperfect CDI
M Forouzesh, P Azmi, N Mokari, D Goeckel
IEEE Transactions on Vehicular Technology 70 (6), 5789-5802, 2021
242021
Robust physical layer security for power domain non-orthogonal multiple access-based HetNets and HUDNs: SIC avoidance at eavesdroppers
M Forouzesh, P Azmi, N Mokari, KK Wong, H Pishro-Nik
IEEE Access 7, 107879-107896, 2019
172019
Covert communications versus physical layer security
M Forouzesh, P Azmi, N Mokari, KK Wong
arXiv preprint arXiv:1803.06608, 1803
151803
Secure transmission with covert requirement in untrusted relaying networks
M Forouzesh, P Azmi, A Kuhestani
2018 9th International Symposium on Telecommunications (IST), 670-675, 2018
132018
Information-theoretic security or covert communication
M Forouzesh, P Azmi, N Mokari, KK Wong, D Goeckel
arXiv preprint arXiv:1803.06608, 2018
92018
Reduce impact of false detection of adversary states on the secure cooperative network
M Forouzesh, P Azmi, N Mokari
2016 8th International Symposium on Telecommunications (IST), 261-265, 2016
72016
Resource Allocation in SCMA-based System
M Moltafet, P Azmi, KALI KARIMI, M Foruzesh
The Modares Journal of Electrical Engineering 15 (1), 9-14, 2015
62015
Deep learning aided secure transmission in wirelessly powered untrusted relaying in the face of hardware impairments
V Shahiri, M Forouzesh, H Behroozi, A Kuhestani, KK Wong
IEEE Open Journal of the Communications Society, 2024
42024
Covert communication using null space and 3D beamforming
M Forouzesh, P Azmi, N Mokari, D Goeckel
arXiv preprint arXiv:1907.01350, 2019
42019
Radio resource allocation in heterogeneous cellular networks based on effective capacity maximization: Perspective mobile data offloading
MH Gholami, P Azmi, N Mokari, M Forouzesh
Transactions on Emerging Telecommunications Technologies 28 (12), e3220, 2017
42017
4G to 5G migration through Core Network
J Dadkhah Chimeh
The Modares Journal of Electrical Engineering 16 (2), 11-14, 2016
42016
The analysis and design of secure wireless networks in the presence of users with different security needs based on covert communication and secure transmission of information …
F Samsami Khodadad, P Baei, M Forouzesh, SM Asgari Tabatabaei
Electronic and Cyber Defense 9 (4), 67-76, 2022
22022
Covert communication based on energy harvesting and cooperative jamming
SF Azerang, F Samsami Khodadad, M Forouzesh
Wireless Networks 28 (8), 3729-3738, 2022
12022
Secure beamforming in relay-aided HetNet with interference nulling
M Jahandideh, P Azmi, N Mokari, M Forouzesh
May, 2019
12019
Secure Full Duplex Communications in the Presence of Malicious Adversary
M Foruzesh, P Azmi
The Modares Journal of Electrical Engineering 16 (2), 32-37, 2016
12016
Resource allocation and BER performance analysis in OFDMA VLC systems
M Forouzesh, SS Kashef
Optics Express 33 (5), 9907-9921, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–20