Alert button
Picture for Ankit Dubey

Ankit Dubey

Alert button

Opportunistic User Scheduling for Secure RIS-aided Wireless Communications

Add code
Bookmark button
Alert button
Mar 05, 2024
Burhan Wafai, Sarbani Ghose, Chinmoy Kundu, Ankit Dubey, Mark F. Flanagan

Figure 1 for Opportunistic User Scheduling for Secure RIS-aided Wireless Communications
Figure 2 for Opportunistic User Scheduling for Secure RIS-aided Wireless Communications
Figure 3 for Opportunistic User Scheduling for Secure RIS-aided Wireless Communications
Figure 4 for Opportunistic User Scheduling for Secure RIS-aided Wireless Communications
Viaarxiv icon

Destination Scheduling for Secure Pinhole-Based Power-Line Communication

Add code
Bookmark button
Alert button
Jun 06, 2023
Chinmoy Kundu, Ankit Dubey, Andrea M. Tonello, Arumugam Nallanathan, Mark F. Flanagan

Figure 1 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Figure 2 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Figure 3 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Figure 4 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Viaarxiv icon

Secrecy of Opportunistic User Scheduling in RIS-Aided Systems: A Comparison with NOMA Scheduling

Add code
Bookmark button
Alert button
Jun 05, 2023
Burhan Wafai, Sarbani Ghose, Chinmoy Kundu, Ankit Dubey, Mark F. Flanagan

Figure 1 for Secrecy of Opportunistic User Scheduling in RIS-Aided Systems: A Comparison with NOMA Scheduling
Figure 2 for Secrecy of Opportunistic User Scheduling in RIS-Aided Systems: A Comparison with NOMA Scheduling
Viaarxiv icon

Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty

Add code
Bookmark button
Alert button
Jan 02, 2023
Burhan Wafai, Chinmoy Kundu, Ankit Dubey, Mark F. Flanagan

Figure 1 for Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty
Figure 2 for Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty
Figure 3 for Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty
Figure 4 for Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty
Viaarxiv icon

Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading

Add code
Bookmark button
Alert button
Aug 30, 2022
Shashi Bhushan Kotwal, Chinmoy Kundu, Sudhakar Modem, Ankit Dubey, Mark F. Flanagan

Figure 1 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Figure 2 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Figure 3 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Figure 4 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Viaarxiv icon

Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication

Add code
Bookmark button
Alert button
Aug 02, 2022
Burhan Wafai, Chinmoy Kundu, Ankit Dubey, Mark F. Flanagan

Figure 1 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Figure 2 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Figure 3 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Figure 4 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Viaarxiv icon

Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation

Add code
Bookmark button
Alert button
Mar 09, 2021
Ankit Dubey, Chinmoy Kundu, Telex M. N. Ngatched, Octavia A. Dobre, Ranjan K. Mallik

Figure 1 for Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation
Figure 2 for Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation
Figure 3 for Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation
Figure 4 for Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation
Viaarxiv icon

Transmitter Selection for Secrecy in a Frequency Selective Fading Channel with Unreliable Backhaul

Add code
Bookmark button
Alert button
Feb 17, 2021
Shashi Bhushan Kotwal, Chinmoy Kundu, Sudhakar Modem, Ankit Dubey, Mark F. Flanagan

Figure 1 for Transmitter Selection for Secrecy in a Frequency Selective Fading Channel with Unreliable Backhaul
Figure 2 for Transmitter Selection for Secrecy in a Frequency Selective Fading Channel with Unreliable Backhaul
Figure 3 for Transmitter Selection for Secrecy in a Frequency Selective Fading Channel with Unreliable Backhaul
Figure 4 for Transmitter Selection for Secrecy in a Frequency Selective Fading Channel with Unreliable Backhaul
Viaarxiv icon

Transmitter Selection for Secrecy in Cognitive Small-Cell Networks with Backhaul Knowledge

Add code
Bookmark button
Alert button
Feb 16, 2021
Burhan Wafai, Chinmoy Kundu, Ankit Dubey, Jinghua Zhang, Mark F. Flanagan

Figure 1 for Transmitter Selection for Secrecy in Cognitive Small-Cell Networks with Backhaul Knowledge
Figure 2 for Transmitter Selection for Secrecy in Cognitive Small-Cell Networks with Backhaul Knowledge
Figure 3 for Transmitter Selection for Secrecy in Cognitive Small-Cell Networks with Backhaul Knowledge
Figure 4 for Transmitter Selection for Secrecy in Cognitive Small-Cell Networks with Backhaul Knowledge
Viaarxiv icon