Alert button
Picture for Chinmoy Kundu

Chinmoy Kundu

Alert button

Opportunistic User Scheduling for Secure RIS-aided Wireless Communications

Add code
Bookmark button
Alert button
Mar 05, 2024
Burhan Wafai, Sarbani Ghose, Chinmoy Kundu, Ankit Dubey, Mark F. Flanagan

Figure 1 for Opportunistic User Scheduling for Secure RIS-aided Wireless Communications
Figure 2 for Opportunistic User Scheduling for Secure RIS-aided Wireless Communications
Figure 3 for Opportunistic User Scheduling for Secure RIS-aided Wireless Communications
Figure 4 for Opportunistic User Scheduling for Secure RIS-aided Wireless Communications
Viaarxiv icon

Destination Scheduling for Secure Pinhole-Based Power-Line Communication

Add code
Bookmark button
Alert button
Jun 06, 2023
Chinmoy Kundu, Ankit Dubey, Andrea M. Tonello, Arumugam Nallanathan, Mark F. Flanagan

Figure 1 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Figure 2 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Figure 3 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Figure 4 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Viaarxiv icon

Secrecy of Opportunistic User Scheduling in RIS-Aided Systems: A Comparison with NOMA Scheduling

Add code
Bookmark button
Alert button
Jun 05, 2023
Burhan Wafai, Sarbani Ghose, Chinmoy Kundu, Ankit Dubey, Mark F. Flanagan

Figure 1 for Secrecy of Opportunistic User Scheduling in RIS-Aided Systems: A Comparison with NOMA Scheduling
Figure 2 for Secrecy of Opportunistic User Scheduling in RIS-Aided Systems: A Comparison with NOMA Scheduling
Viaarxiv icon

Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty

Add code
Bookmark button
Alert button
Jan 02, 2023
Burhan Wafai, Chinmoy Kundu, Ankit Dubey, Mark F. Flanagan

Figure 1 for Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty
Figure 2 for Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty
Figure 3 for Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty
Figure 4 for Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty
Viaarxiv icon

Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading

Add code
Bookmark button
Alert button
Aug 30, 2022
Shashi Bhushan Kotwal, Chinmoy Kundu, Sudhakar Modem, Ankit Dubey, Mark F. Flanagan

Figure 1 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Figure 2 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Figure 3 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Figure 4 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Viaarxiv icon

Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication

Add code
Bookmark button
Alert button
Aug 02, 2022
Burhan Wafai, Chinmoy Kundu, Ankit Dubey, Mark F. Flanagan

Figure 1 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Figure 2 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Figure 3 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Figure 4 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Viaarxiv icon

Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections

Add code
Bookmark button
Alert button
Mar 09, 2021
Jinghua Zhang, Chinmoy Kundu, Emi Garcia-Palacios

Figure 1 for Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections
Figure 2 for Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections
Figure 3 for Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections
Figure 4 for Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections
Viaarxiv icon

Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation

Add code
Bookmark button
Alert button
Mar 09, 2021
Ankit Dubey, Chinmoy Kundu, Telex M. N. Ngatched, Octavia A. Dobre, Ranjan K. Mallik

Figure 1 for Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation
Figure 2 for Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation
Figure 3 for Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation
Figure 4 for Incremental Relaying for Power Line Communication: Performance Analysis and Power Allocation
Viaarxiv icon

Secrecy Performance of Small-Cell Networks with Transmitter Selection and Unreliable Backhaul under Spectrum Sharing Environment

Add code
Bookmark button
Alert button
Mar 07, 2021
Jinghua Zhang, Chinmoy Kundu, Octavia A. Dobre, Emi Garcia-Palacios, Nguyen-Son Vo

Figure 1 for Secrecy Performance of Small-Cell Networks with Transmitter Selection and Unreliable Backhaul under Spectrum Sharing Environment
Figure 2 for Secrecy Performance of Small-Cell Networks with Transmitter Selection and Unreliable Backhaul under Spectrum Sharing Environment
Figure 3 for Secrecy Performance of Small-Cell Networks with Transmitter Selection and Unreliable Backhaul under Spectrum Sharing Environment
Figure 4 for Secrecy Performance of Small-Cell Networks with Transmitter Selection and Unreliable Backhaul under Spectrum Sharing Environment
Viaarxiv icon

Secrecy Outage of Dual-hop Regenerative Multi-relay System with Relay Selection

Add code
Bookmark button
Alert button
Mar 07, 2021
Chinmoy Kundu, Sarbani Ghose, Ranjan Bose

Figure 1 for Secrecy Outage of Dual-hop Regenerative Multi-relay System with Relay Selection
Figure 2 for Secrecy Outage of Dual-hop Regenerative Multi-relay System with Relay Selection
Figure 3 for Secrecy Outage of Dual-hop Regenerative Multi-relay System with Relay Selection
Figure 4 for Secrecy Outage of Dual-hop Regenerative Multi-relay System with Relay Selection
Viaarxiv icon