default search action
Ali Kuhestani
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Hossein Ahmadi, Ali Kuhestani, Luca Mesin:
Adversarial Neural Network Training for Secure and Robust Brain-to-Brain Communication. IEEE Access 12: 39450-39469 (2024) - [j29]Vahid Shahiri, Hamid Behroozi, Ali Kuhestani, Kai-Kit Wong:
Reconfigurable-Intelligent-Surface-Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments. IEEE Internet Things J. 11(9): 15808-15822 (2024) - [j28]Vahid Shahiri, Moslem Forouzesh, Hamid Behroozi, Ali Kuhestani, Kai-Kit Wong:
Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments. IEEE Open J. Commun. Soc. 5: 2196-2210 (2024) - [j27]Mohammadreza Keshavarzi, Hadi Zayyani, Ali Kuhestani, Hossein Ahmadi:
A new practical physical layer secret key generation in the presence of an untrusted relay. Phys. Commun. 66: 102407 (2024) - [j26]Hamed Saedi, Abbas Mohammadi, Ali Kuhestani:
Secure communication with a multiple-antennas untrusted relay in presence of randomly distributed adversary jammers. Phys. Commun. 66: 102463 (2024) - [j25]Mohammad Ragheb, Ali Kuhestani, Mohammad Kazemi, Mohammad Hossein Ahmadi, Lajos Hanzo:
RIS-Aided Secure Millimeter-Wave Communication Under RF-Chain Impairments. IEEE Trans. Veh. Technol. 73(1): 952-963 (2024) - [j24]Zahra Ezzati Khatab, Abbas Mohammadi, Vahid Pourahmadi, Ali Kuhestani:
A machine learning multi-hop physical layer authentication with hardware impairments. Wirel. Networks 30(3): 1453-1464 (2024) - [c9]Mahyar Ghasedi, Paeiz Azmi, MohammadReza Yari, Ali Kuhestani, Hamid Saeedi:
A Novel Group Secret Key Generation: Performance Analysis and Secrecy Improvement. WCNC 2024: 1-6 - 2023
- [j23]Moslem Forouzesh, Farid Samsami Khodadad, Paeiz Azmi, Ali Kuhestani, Hossein Ahmadi:
Simultaneous Secure and Covert Transmissions Against Two Attacks Under Practical Assumptions. IEEE Internet Things J. 10(12): 10160-10171 (2023) - 2022
- [j22]Vahid Shahiri, Ali Kuhestani, Lajos Hanzo:
Short-Packet Amplify-and-Forward Relaying for the Internet-of-Things in the Face of Imperfect Channel Estimation and Hardware Impairments. IEEE Trans. Green Commun. Netw. 6(1): 20-36 (2022) - [j21]Mohammad Ragheb, Sayed Mostafa Safavi Hemami, Ali Kuhestani, Derrick Wing Kwan Ng, Lajos Hanzo:
On the Physical Layer Security of Untrusted Millimeter Wave Relaying Networks: A Stochastic Geometry Approach. IEEE Trans. Inf. Forensics Secur. 17: 53-68 (2022) - 2021
- [j20]Mehdi Letafati, Ali Kuhestani, Kai-Kit Wong, Md. Jalil Piran:
A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer. IEEE Internet Things J. 8(6): 4373-4388 (2021) - [j19]Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani, Phee Lep Yeoh:
Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden. IEEE Internet Things J. 8(9): 7170-7181 (2021) - [j18]Milad Tatar Mamaghani, Ali Kuhestani, Hamid Behroozi:
Can a multi-hop link relying on untrusted amplify-and-forward relays render security? Wirel. Networks 27(1): 795-807 (2021) - 2020
- [j17]Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani, Phee Lep Yeoh:
Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens. IEEE Trans. Commun. 68(6): 3737-3749 (2020) - [j16]Mehdi Letafati, Ali Kuhestani, Hamid Behroozi:
Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things. IEEE Trans. Inf. Forensics Secur. 15: 2856-2868 (2020) - [j15]Mehdi Letafati, Ali Kuhestani, Hamid Behroozi, Derrick Wing Kwan Ng:
Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay. IEEE Trans. Wirel. Commun. 19(10): 6771-6785 (2020) - [j14]Hamed Saedi, Abbas Mohammadi, Ali Kuhestani:
Characterization of untrusted relaying networks in the presence of an adversary jammer. Wirel. Networks 26(3): 2113-2124 (2020) - [c8]Mehdi Letafati, Ali Kuhestani, Derrick Wing Kwan Ng, Mohammad Reza Ahmadi Beshkani:
Physical Layer Secrecy and Transmission Resiliency of Device-to-Device Communications. GLOBECOM 2020: 1-6 - [c7]Mehdi Letafati, Ali Kuhestani, Derrick Wing Kwan Ng, Hamid Behroozi:
A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay. ICC Workshops 2020: 1-7
2010 – 2019
- 2019
- [j13]Majid Moradikia, Hamed Bastami, Ali Kuhestani, Hamid Behroozi, Lajos Hanzo:
Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments. IEEE Access 7: 116942-116964 (2019) - [i7]Ali Kuhestani, Milad Tatar Mamaghani, Hamid Behroozi:
A new secure multi-hop untrusted relaying scheme. CoRR abs/1905.09384 (2019) - 2018
- [j12]Ali Kuhestani, Abbas Mohammadi, Phee Lep Yeoh:
Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer. IEEE Trans. Commun. 66(6): 2671-2684 (2018) - [j11]Ali Kuhestani, Abbas Mohammadi, Mohammadali Mohammadi:
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 13(2): 341-355 (2018) - [j10]Milad Tatar Mamaghani, Ali Kuhestani, Kai-Kit Wong:
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer. IEEE Trans. Veh. Technol. 67(9): 8451-8465 (2018) - [j9]Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad R. A. Khandaker:
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks. IEEE Trans. Wirel. Commun. 17(7): 4302-4314 (2018) - [c6]Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani:
Secure Transmission with Covert Requirement in Untrusted Relaying Networks. IST 2018: 670-675 - [c5]Ali Kuhestani, Abbas Mohammadi, Phee Lep Yeoh:
Security-reliability trade-off in cyber-physical cooperative systems with non-ideal untrusted relaying. WF-IoT 2018: 552-557 - [i6]Moslem Forouzesh, Paeiz Azmi, Ali Kuhestani:
Secure transmission with covert requirement in untrusted relaying networks. CoRR abs/1809.00312 (2018) - 2017
- [j8]Koosha Pourtahmasi Roshandeh, Ali Kuhestani, Masoud Ardakani, Chintha Tellambura:
Ergodic sum rate analysis and efficient power allocation for a massive MIMO two-way relay network. IET Commun. 11(2): 211-217 (2017) - [c4]Ali Kuhestani, Phee Lep Yeoh, Abbas Mohammadi:
Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying. GLOBECOM 2017: 1-6 - [c3]Milad Tatar Mamaghani, Abbas Mohammadi, Phee Lep Yeoh, Ali Kuhestani:
Secure Two-Way Communication via a Wireless Powered Untrusted Relay and Friendly Jammer. GLOBECOM 2017: 1-6 - [i5]Milad Tatar Mamaghani, Ali Kuhestani, Kai-Kit Wong:
Energy Harvesting Based Secure Two-Way Communication Using an Untrusted Relay. CoRR abs/1708.06437 (2017) - [i4]Milad Tatar Mamaghani, Abbas Mohammadi, Phee Lep Yeoh, Ali Kuhestani:
Secure two-way communication via a wireless powered untrusted relay and friendly jammer. CoRR abs/1708.06562 (2017) - [i3]Ali Kuhestani, Phee Lep Yeoh, Abbas Mohammadi:
Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying. CoRR abs/1709.01330 (2017) - [i2]Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad R. A. Khandaker:
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks. CoRR abs/1709.01334 (2017) - [i1]Ali Kuhestani, Abbas Mohammadi, Mohammadali Mohammadi:
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers. CoRR abs/1709.01341 (2017) - 2016
- [j7]Ali Kuhestani, Abbas Mohammadi:
Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: resource allocation and performance study. IET Commun. 10(1): 17-23 (2016) - [j6]Ali Kuhestani, Abbas Mohammadi, Moslem Noori:
Optimal power allocation to improve secrecy performance of non-regenerative cooperative systems using an untrusted relay. IET Commun. 10(8): 962-968 (2016) - [j5]Houman Zarrabi, Ali Kuhestani, Majid Moradikia:
EE-RS and PA for untrusted relay network at high signal-to-noise ratio regime. IET Commun. 10(16): 2143-2148 (2016) - [j4]Ali Kuhestani, Abbas Mohammadi, Meysam Masoudi:
Joint optimal power allocation and relay selection to establish secure transmission in uplink transmission of untrusted relays network. IET Networks 5(2): 30-36 (2016) - 2015
- [j3]Ali Kuhestani, Abbas Mohammadi:
Diversity-multiplexing trade-off of linear dispersion coded multi-input-multi-output systems. IET Commun. 9(1): 55-61 (2015) - 2014
- [j2]Ali Kuhestani, Hossein Pilaram, Abbas Mohammadi:
Simply decoded efficient full-rate space-time block codes over correlated Rician fading channels. IET Commun. 8(10): 1684-1695 (2014) - [c2]Ali Kuhestani, Abbas Mohammadi:
Finite-SNR diversity-multiplexing tradeoff of linear dispersion coded MISO systems. IWCIT 2014: 1-4 - 2013
- [j1]Ali Kuhestani, Paeiz Azmi:
Design of efficient full-rate linear dispersion spacetime block codes over correlated fading channels. IET Commun. 7(12): 1243-1253 (2013) - 2012
- [c1]Ali Kuhestani, Paeiz Azmi, Hossein Pilaram:
Efficient full-rate LDCs in correlated Rician fading channel with decoupled decoder. IST 2012: 393-398
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint