default search action
Amitav Mukherjee
- > Home > Persons > Amitav Mukherjee
Publications
- 2014
- [j10]Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst:
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutorials 16(3): 1550-1573 (2014) - 2013
- [j7]Amitav Mukherjee, A. Lee Swindlehurst:
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper. IEEE Trans. Signal Process. 61(1): 82-91 (2013) - [j6]Jing Huang, Amitav Mukherjee, A. Lee Swindlehurst:
Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels. IEEE Trans. Signal Process. 61(10): 2536-2550 (2013) - [j5]Amitav Mukherjee, A. Lee Swindlehurst:
Prescient Precoding in Heterogeneous DSA Networks with Both Underlay and Interweave MIMO Cognitive Radios. IEEE Trans. Wirel. Commun. 12(5): 2252-2260 (2013) - [i13]Jing Huang, Amitav Mukherjee, A. Lee Swindlehurst:
Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels. CoRR abs/1302.1216 (2013) - [i10]Amitav Mukherjee, A. Lee Swindlehurst:
On the Detection of Passive Eavesdroppers in the MIMO Wiretap Channel. CoRR abs/1308.2357 (2013) - 2012
- [j4]Amitav Mukherjee, A. Lee Swindlehurst:
Modified Waterfilling Algorithms for MIMO Spatial Multiplexing with Asymmetric CSI. IEEE Wirel. Commun. Lett. 1(2): 89-92 (2012) - [c23]Minyan Pei, Amitav Mukherjee, A. Lee Swindlehurst, Jibo Wei:
Rank minimization designs for underlay MIMO cognitive radio networks with completely unknown primary CSI. GLOBECOM 2012: 1150-1155 - [c22]Jing Huang, Amitav Mukherjee, A. Lee Swindlehurst:
Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection. ICASSP 2012: 2481-2484 - [c21]Amitav Mukherjee, A. Lee Swindlehurst:
Detecting passive eavesdroppers in the MIMO wiretap channel. ICASSP 2012: 2809-2812 - [c20]Jing Huang, Amitav Mukherjee, A. Lee Swindlehurst:
Outage performance for amplify-and-forward channels with an unauthenticated relay. ICC 2012: 893-897 - [i9]Amitav Mukherjee, Minyan Pei, A. Lee Swindlehurst:
MIMO Precoding in Underlay Cognitive Radio Systems with Completely Unknown Primary CSI. CoRR abs/1204.1096 (2012) - 2011
- [j3]Amitav Mukherjee, A. Lee Swindlehurst:
Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI. IEEE Trans. Signal Process. 59(1): 351-361 (2011) - [c18]Amitav Mukherjee, A. Lee Swindlehurst:
A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures. ACSCC 2011: 265-269 - [c17]Amitav Mukherjee, A. Lee Swindlehurst:
Prescient beamforming in multi-user interweave cognitive radio networks. CAMSAP 2011: 253-256 - [c16]Jianqi Wang, Amitav Mukherjee, A. Lee Swindlehurst:
Interference self-mitigating beamforming for the K-user MIMO IC. ICASSP 2011: 3352-3355 - [i8]Amitav Mukherjee, A. Lee Swindlehurst:
Prescient Beamforming by Primary Transmitters in Interweave Cognitive Radio Networks with a Single Primary Receiver. CoRR abs/1107.3995 (2011) - 2010
- [c15]Amitav Mukherjee, A. Lee Swindlehurst:
Poisoned feedback: The impact of malicious users in closed-loop multiuser mimo systems. ICASSP 2010: 2558-2561 - [c14]Amitav Mukherjee, A. Lee Swindlehurst:
Ensuring Secrecy in MIMO Wiretap Channels with Imperfect CSIT: A Beamforming Approach. ICC 2010: 1-5 - [c13]Amitav Mukherjee, A. Lee Swindlehurst:
Equilibrium Outcomes of Dynamic Games in MIMO Channels with Active Eavesdroppers. ICC 2010: 1-5 - [i5]Amitav Mukherjee, A. Lee Swindlehurst:
Poisoned Feedback: The Impact of Malicious Users in Closed-Loop Multiuser MIMO Systems. CoRR abs/1008.3730 (2010) - [i4]Amitav Mukherjee, A. Lee Swindlehurst:
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI. CoRR abs/1009.2274 (2010) - [i3]Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst:
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. CoRR abs/1011.3754 (2010) - [i2]Amitav Mukherjee, A. Lee Swindlehurst:
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper. CoRR abs/1011.5274 (2010) - 2009
- [c11]Amitav Mukherjee, A. Lee Swindlehurst:
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels. Allerton 2009: 1134-1141 - [i1]Amitav Mukherjee, A. Lee Swindlehurst:
Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels. CoRR abs/0910.2525 (2009)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint