


default search action
Ajay Singh 0001
Person information
- affiliation: Indian Institute of Technology Jammu Jagti, Jammu and Kashmir, India
Other persons with the same name
- Ajay Singh — disambiguation page
- Ajay Singh 0002 ![0000-0001-6534-8137 [0000-0001-6534-8137]](https://dblp.dagstuhl.de/img/orcid-mark.12x12.png) — University of Waterloo, ON, Canada — University of Waterloo, ON, Canada
- Ajay Singh 0003 — Uttaranchal University, Dehradun, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j21]Ajay Singh [j21]Ajay Singh , Bijaya Ketan Panigrahi , Bijaya Ketan Panigrahi : :
 Prosumer Cost Efficiency and Ensuring Grid Stability Through a Hierarchical PPO Framework in Decentralized Community Energy Management. IEEE Access 13: 38368-38386 (2025)
- 2024
 [j20]Gaurav Sharma [j20]Gaurav Sharma , Ranjan K. Mallik , Ranjan K. Mallik , Nilay Pandey , Nilay Pandey , Ajay Singh , Ajay Singh : :
 Effect of Interfering Transmitter on the Secrecy of Diffusive Molecular Timing Channels. IEEE Trans. Commun. 72(6): 3323-3337 (2024)
 [c16]Soleha Kousar, Ajay Singh: [c16]Soleha Kousar, Ajay Singh:
 Secrecy Performance of SWIPT Cognitive Radio Networks with Eavesdropper's Decoding Capability. NCC 2024: 1-6
 [c15]Soleha Kousar, Ajay Singh: [c15]Soleha Kousar, Ajay Singh:
 On the Secrecy of SWIPT Systems: An Amount of Confusion Loss Perspective. VTC Spring 2024: 1-5
 [c14]Koduru Sree Venkateswara Rao, Ajay Singh: [c14]Koduru Sree Venkateswara Rao, Ajay Singh:
 Security of RIS-Aided Energy Harvesting Based D2D Communications in Cognitive Cellular Network. VTC Spring 2024: 1-6
 [c13]Ajay Singh, Surjeet Kumar: [c13]Ajay Singh, Surjeet Kumar:
 D2D Communications with Energy Harvesting: An Optimal Secrecy Throughput Perspective. VTC Spring 2024: 1-5
- 2023
 [j19]Anshu Thakur, Ashok Kumar, Nitin Gupta [j19]Anshu Thakur, Ashok Kumar, Nitin Gupta , Ajay Singh: , Ajay Singh:
 Secrecy outage performance analysis of MIMO underlay cognitive radio networks with delayed CSI and transmitter antenna selection. Int. J. Commun. Syst. 36(12) (2023)
 [j18]Shilpa Thakur [j18]Shilpa Thakur , Ajay Singh , Ajay Singh , Sudhan Majhi , Sudhan Majhi : :
 Secrecy Analysis of Underlay CRN in the Presence of Correlated and Imperfect Channel. IEEE Trans. Cogn. Commun. Netw. 9(3): 754-764 (2023)
 [c12]Surjeet Kumar, Shilpa Thakur, Ajay Singh: [c12]Surjeet Kumar, Shilpa Thakur, Ajay Singh:
 Secrecy Performance of Energy Harvesting Based D2D Communications in Spectrum-Sharing Networks. ICOIN 2023: 410-414
 [c11]Koduru Sree Venkateswara Rao, Ajay Singh: [c11]Koduru Sree Venkateswara Rao, Ajay Singh:
 Security of Energy Harvesting Based D2D Communications in Cognitive Cellular Network. ICOIN 2023: 415-419
- 2022
 [j17]Gaurav Sharma [j17]Gaurav Sharma , Nilay Pandey , Nilay Pandey , Ajay Singh , Ajay Singh , Ranjan K. Mallik , Ranjan K. Mallik : :
 Security in Diffusive Molecular Timing Channels: An Amount of Confusion Level Perspective. IEEE Trans. Mol. Biol. Multi Scale Commun. 8(3): 190-201 (2022)
 [j16]Gaurav Sharma [j16]Gaurav Sharma , Ajay Singh , Ajay Singh : :
 Secrecy Loss in Diffusive Molecular Timing Channels. IEEE Trans. Mol. Biol. Multi Scale Commun. 8(4): 297-304 (2022)
 [j15]Shilpa Thakur [j15]Shilpa Thakur , Ajay Singh , Ajay Singh : :
 Secrecy Performance of Underlay Cognitive Radio Networks With Primary Interference. IEEE Trans. Netw. Sci. Eng. 9(4): 2641-2657 (2022)
 [j14]Gaurav Sharma [j14]Gaurav Sharma , Nilay Pandey , Nilay Pandey , Ajay Singh , Ajay Singh , Ranjan K. Mallik , Ranjan K. Mallik : :
 Impact of Mutual Influence Between Bob and Eve on the Secrecy of Diffusion-Based Molecular Timing Channels. IEEE Wirel. Commun. Lett. 11(11): 2255-2259 (2022)
- 2021
 [j13]Gaurav Sharma [j13]Gaurav Sharma , Ajay Singh , Ajay Singh : :
 Secrecy performance of diffusion based molecular timing channels. IET Commun. 15(2): 289-304 (2021)
 [j12]Gaurav Sharma [j12]Gaurav Sharma , Nilay Pandey , Nilay Pandey , Ajay Singh , Ajay Singh , Ranjan K. Mallik , Ranjan K. Mallik : :
 Secrecy Optimization for Diffusion-Based Molecular Timing Channels. IEEE Trans. Mol. Biol. Multi Scale Commun. 7(4): 253-261 (2021)
 [j11]Shilpa Thakur [j11]Shilpa Thakur , Ajay Singh , Ajay Singh : :
 Underlay Cognitive Radio With Instantaneous Interference Constraint: A Secrecy Performance. IEEE Trans. Veh. Technol. 70(8): 7839-7844 (2021)
 [c10]Gaurav Sharma [c10]Gaurav Sharma , Ajay Singh: , Ajay Singh:
 On the Optimal Threshold and Error Performance at Fusion Center for Diffusion-Based Molecular Communication System. ANTS 2021: 1-6
- 2020
 [j10]Ajay Singh [j10]Ajay Singh , Manav R. Bhatnagar , Manav R. Bhatnagar , Ranjan K. Mallik: , Ranjan K. Mallik:
 Secrecy Outage Performance of SWIPT Cognitive Radio Network With Imperfect CSI. IEEE Access 8: 3911-3919 (2020)
 [j9]Shilpa Thakur, Ajay Singh [j9]Shilpa Thakur, Ajay Singh : :
 Secure transmission using optimal antenna selection for MIMO underlay CRN with multiple primary users. IET Commun. 14(7): 1090-1101 (2020)
2010 – 2019
- 2019
 [j8]Shilpa Thakur [j8]Shilpa Thakur , Ajay Singh: , Ajay Singh:
 Secure transmission in underlay cognitive radio network with outdated channel state information. Phys. Commun. 37 (2019)
 [c9]Shilpa Thakur, Ajay Singh: [c9]Shilpa Thakur, Ajay Singh:
 Secrecy performance Analysis for Underlay Cognitive Radio Network with Optimal Antenna Selection and Generalized Receiver Selection. ANTS 2019: 1-6
 [c8]Gaurav Sharma [c8]Gaurav Sharma , Ajay Singh: , Ajay Singh:
 On the Distribution of Molecules for Diffusion Based Molecular Communication System. ICCCNT 2019: 1-6
 [c7]Shilpa Thakur [c7]Shilpa Thakur , Ajay Singh: , Ajay Singh:
 Ergodic Secrecy Capacity in Nakagami-m Fading Channels. ICCST 2019: 1-3
 [c6]Shilpa Thakur [c6]Shilpa Thakur , Ajay Singh: , Ajay Singh:
 Secrecy Performance of Cognitive Radio Networks Using Arbitrary Transmit Antenna Selection and Threshold- Based MRC. VTC Fall 2019: 1-5
- 2018
 [j7]Shilpa Thakur [j7]Shilpa Thakur , Ajay Singh: , Ajay Singh:
 Secrecy analysis of cognitive radio network with MS-GSC/MRC scheme. EURASIP J. Wirel. Commun. Netw. 2018: 114 (2018)
 [c5]Gaurav Sharma [c5]Gaurav Sharma , Ajay Singh: , Ajay Singh:
 On the Optimal Threshold for Diffusion Based Molecular Communication System. EECS 2018: 366-370
 [c4]Shilpa Thakur [c4]Shilpa Thakur , Anshu Thakur, Surinder Soni, Ajay Singh: , Anshu Thakur, Surinder Soni, Ajay Singh:
 On the Performance of GSC/MRC based Cognitive Radio Networks with Multiple Primary Users. ICIIS 2018: 251-257
- 2017
 [j6]Saptarshi Ghosh [j6]Saptarshi Ghosh , Manav R. Bhatnagar , Manav R. Bhatnagar , Ajay Singh, Bijaya K. Panigrahi: , Ajay Singh, Bijaya K. Panigrahi:
 Secrecy Capacity in CRN With Malicious Energy Harvester Using Game Theoretic Techniques. IEEE Trans. Cogn. Commun. Netw. 3(3): 343-360 (2017)
 [j5]Ajay Singh, Manav R. Bhatnagar [j5]Ajay Singh, Manav R. Bhatnagar , Ranjan K. Mallik , Ranjan K. Mallik : :
 Physical Layer Security of a Multiantenna-Based CR Network With Single and Multiple Primary Users. IEEE Trans. Veh. Technol. 66(12): 11011-11022 (2017)
- 2016
 [j4]Ajay Singh, Manav R. Bhatnagar [j4]Ajay Singh, Manav R. Bhatnagar , Ranjan K. Mallik , Ranjan K. Mallik : :
 Performance of an Improved Energy Detector in Multihop Cognitive Radio Networks. IEEE Trans. Veh. Technol. 65(2): 732-743 (2016)
 [j3]Ajay Singh, Manav R. Bhatnagar [j3]Ajay Singh, Manav R. Bhatnagar , Ranjan K. Mallik , Ranjan K. Mallik : :
 Secrecy Outage of a Simultaneous Wireless Information and Power Transfer Cognitive Radio System. IEEE Wirel. Commun. Lett. 5(3): 288-291 (2016)
 [c3]Saptarshi Ghosh [c3]Saptarshi Ghosh , Manav R. Bhatnagar , Manav R. Bhatnagar , Ajay Singh, Bijaya K. Panigrahi: , Ajay Singh, Bijaya K. Panigrahi:
 Achieving Secure Communication in CRN with Malicious Energy Harvester Using Game Theory. GLOBECOM 2016: 1-7
- 2013
 [j2]Ajay Singh, Manav R. Bhatnagar [j2]Ajay Singh, Manav R. Bhatnagar , Ranjan K. Mallik , Ranjan K. Mallik : :
 Threshold optimization of a finite sample-based cognitive radio network using energy detector. EURASIP J. Wirel. Commun. Netw. 2013: 165 (2013)
 [c2]Ajay Singh, Manav R. Bhatnagar [c2]Ajay Singh, Manav R. Bhatnagar , Ranjan K. Mallik , Ranjan K. Mallik : :
 Performance analysis of multiple sample based improved energy detector in collaborative CR networks. PIMRC 2013: 2728-2732
- 2012
 [j1]Ajay Singh, Manav R. Bhatnagar [j1]Ajay Singh, Manav R. Bhatnagar , Ranjan K. Mallik , Ranjan K. Mallik : :
 Cooperative Spectrum Sensing in Multiple Antenna Based Cognitive Radio Network Using an Improved Energy Detector. IEEE Commun. Lett. 16(1): 64-67 (2012)
- 2011
 [c1]Ajay Singh, Manav R. Bhatnagar [c1]Ajay Singh, Manav R. Bhatnagar , Ranjan K. Mallik , Ranjan K. Mallik : :
 Optimization of Cooperative Spectrum Sensing with an Improved Energy Detector over Imperfect Reporting Channels. VTC Fall 2011: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-16 00:15 CEST by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







