Picture for Majid Moradikia

Majid Moradikia

Reza

Adversarial Attacks on Graph Neural Networks based Spatial Resource Management in P2P Wireless Communications

Add code
Dec 13, 2023
Figure 1 for Adversarial Attacks on Graph Neural Networks based Spatial Resource Management in P2P Wireless Communications
Figure 2 for Adversarial Attacks on Graph Neural Networks based Spatial Resource Management in P2P Wireless Communications
Figure 3 for Adversarial Attacks on Graph Neural Networks based Spatial Resource Management in P2P Wireless Communications
Figure 4 for Adversarial Attacks on Graph Neural Networks based Spatial Resource Management in P2P Wireless Communications
Viaarxiv icon

Secure SWIPT in STAR-RIS Aided Downlink MISO Rate-Splitting Multiple Access Networks

Add code
Nov 16, 2022
Viaarxiv icon

Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection

Add code
Oct 08, 2022
Figure 1 for Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection
Figure 2 for Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection
Figure 3 for Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection
Figure 4 for Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection
Viaarxiv icon

Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel

Add code
Sep 26, 2022
Figure 1 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Figure 2 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Figure 3 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Figure 4 for Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Viaarxiv icon

Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks

Add code
May 29, 2022
Figure 1 for Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Figure 2 for Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Figure 3 for Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Figure 4 for Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Viaarxiv icon

Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning

Add code
Jan 07, 2021
Figure 1 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Figure 2 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Figure 3 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Figure 4 for Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Viaarxiv icon