Picture for Ravikant Saini

Ravikant Saini

Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization

Add code
Aug 17, 2023
Figure 1 for Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization
Figure 2 for Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization
Figure 3 for Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization
Figure 4 for Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization
Viaarxiv icon

Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error

Add code
Aug 17, 2023
Viaarxiv icon

Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users

Add code
Mar 31, 2021
Figure 1 for Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users
Figure 2 for Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users
Figure 3 for Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users
Figure 4 for Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users
Viaarxiv icon

Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective

Add code
Mar 30, 2021
Figure 1 for Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective
Figure 2 for Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective
Figure 3 for Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective
Figure 4 for Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective
Viaarxiv icon

Decoding Orders for Securing Untrusted NOMA

Add code
Mar 30, 2021
Figure 1 for Decoding Orders for Securing Untrusted NOMA
Figure 2 for Decoding Orders for Securing Untrusted NOMA
Viaarxiv icon

Secrecy Fairness Aware NOMA for Untrusted Users

Add code
Mar 30, 2021
Figure 1 for Secrecy Fairness Aware NOMA for Untrusted Users
Figure 2 for Secrecy Fairness Aware NOMA for Untrusted Users
Figure 3 for Secrecy Fairness Aware NOMA for Untrusted Users
Figure 4 for Secrecy Fairness Aware NOMA for Untrusted Users
Viaarxiv icon