Compress-and-forward strategy for the relay channel with non-causal state information B Akhbari, M Mirmohseni, MR Aref 2009 IEEE International Symposium on Information Theory, 1169-1173, 2009 | 37 | 2009 |
Compress-and-forward strategy for relay channel with causal and non-causal channel state information B Akhbari, M Mirmohseni, MR Aref IET communications 4 (10), 1174-1186, 2010 | 29 | 2010 |
Watermarking of still images using multiresolution singular value decomposition B Akhbari, S Ghaemmaghami 2005 International Symposium on Intelligent Signal Processing and …, 2005 | 28 | 2005 |
Watermarking of still images in wavelet domain based on entropy masking model B Akhbari, S Ghaemmaghami TENCON 2005-2005 IEEE Region 10 Conference, 1-6, 2005 | 24 | 2005 |
On the capacity of interference channel with causal and noncausal generalized feedback at the cognitive transmitter M Mirmohseni, B Akhbari, MR Aref IEEE Transactions on Information Theory 58 (5), 2813-2837, 2012 | 22 | 2012 |
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid S Darzi, B Akhbari, H Khodaiemehr Cluster Computing 25 (1), 263-278, 2022 | 19 | 2022 |
Compress-and-forward strategy for the relay channel with causal state information M Mirmohseni, B Akhbari, MR Aref 2009 IEEE Information Theory Workshop, 426-430, 2009 | 19 | 2009 |
Classical-Quantum Multiple Access Wiretap Channel H Aghaee, B Akhbari 2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019 | 15 | 2019 |
Attacks and improvements on two new-found RFID authentication protocols B Abdolmaleki, K Baghery, B Akhbari, MR Aref 7'th International Symposium on Telecommunications (IST'2014), 895-900, 2014 | 15 | 2014 |
Imperfect and perfect secrecy in compound multiple access channel with confidential message H Zivari-Fard, B Akhbari, M Ahmadian-Attari, MR Aref IEEE Transactions on Information Forensics and Security 11 (6), 1239-1251, 2016 | 11 | 2016 |
Privacy analysis and improvements of two recent RFID authentication protocols K Baghery, B Abdolmaleki, B Akhbari, MR Aref 2014 11th International ISC Conference on Information Security and …, 2014 | 10 | 2014 |
Cooperative relay-broadcast channels with causal channel state information R Khosravi-Farsani, B Akhbari, M Mirmohseni, MR Aref 2009 IEEE International Symposium on Information Theory, 1174-1178, 2009 | 10 | 2009 |
Capacity bounds for the three-user cognitive z-interference channel M Mirmohseni, B Akhbari, MR Aref 2011 12th Canadian Workshop on Information Theory, 34-37, 2011 | 9 | 2011 |
Multiple access channel with common message and secrecy constraint H Zivari-Fard, B Akhbari, M Ahmadian-Attari, MR Aref IET Communications 10 (1), 98-110, 2016 | 8 | 2016 |
Cryptanalysis of two EPC-based RFID security schemes B Abdolmaleki, K Baghery, B Akhbari, MR Aref 2015 12th International Iranian Society of Cryptology Conference on …, 2015 | 8 | 2015 |
Enhancing privacy of recent authentication schemes for low-cost RFID systems K Baghery, B Abdolmaleki, B Akhbari, MR Aref ISeCure-The ISC International Journal of Information Security 7 (2), 135-149, 2015 | 8 | 2015 |
Compound multiple access channel with confidential messages H Zivari-Fard, B Akhbari, M Ahmadian-Attari, MR Aref 2014 IEEE International Conference on Communications (ICC), 1922-1927, 2014 | 8 | 2014 |
Three-user cognitive interference channel: Capacity region with strong interference M Mirmohseni, B Akhbari, MR Aref IET communications 6 (13), 2099-2107, 2012 | 8 | 2012 |
Achievable rate regions for Dirty Tape Channels and “joint writing on Dirty paper and Dirty Tape” R Khosravi-Farsani, B Akhbari, MR Aref 2010 IEEE Information Theory Workshop, 1-5, 2010 | 8 | 2010 |
Capacity regions for some classes of causal cognitive interference channels with delay M Mirmohseni, B Akhbari, MR Aref 2010 IEEE Information Theory Workshop, 1-5, 2010 | 7 | 2010 |