Azadeh Sheikholeslami
Title
Cited by
Cited by
Year
Physical layer security from inter-session interference in large wireless networks
A Sheikholeslami, D Goeckel, H Pishro-Nik, D Towsley
2012 Proceedings IEEE INFOCOM, 1179-1187, 2012
532012
Covert communication over classical-quantum channels
A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha
2016 IEEE International Symposium on Information Theory (ISIT), 2064-2068, 2016
392016
Multi-hop routing in covert wireless networks
A Sheikholeslami, M Ghaderi, D Towsley, BA Bash, S Guha, D Goeckel
IEEE Transactions on Wireless Communications 17 (6), 3656-3669, 2018
362018
Jamming-aware minimum energy routing in wireless networks
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
2014 IEEE International Conference on Communications (ICC), 2313-2318, 2014
222014
Energy-efficient routing in wireless networks in the presence of jamming
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
IEEE Transactions on Wireless Communications 15 (10), 6828-6842, 2016
212016
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver
A Sheikholeslami, D Goeckel, H Pishro-nik
Selected Areas in Communications, IEEE Journal on 31 (9), 1828 - 1839, 2013
202013
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy
A Sheikholeslami, D Goeckel, H Pishro-Nik
2013 IEEE International Symposium on Information Theory, 2950-2954, 2013
142013
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments
A Sheikholeslami, D Goeckel, H Pishro-Nik
IEEE Transactions on Wireless Communications, 2015
112015
Energy-efficient secrecy in wireless networks based on random jamming
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
IEEE Transactions on Communications 65 (6), 2522-2533, 2017
102017
2016 IEEE International Symposium on Information Theory (ISIT)
A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha
IEEE, 2016
62016
Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments
A Sheikholeslami, D Goeckel, H Pishro-Nik
2012 50th Annual Allerton Conference on Communication, Control, and …, 2012
62012
Everlasting Secrecy in Disadvantaged Wireless Environments against Sophisticated Eavesdroppers
A Sheikholeslami, D Goeckel, H Pishro-nik
Proceedings of 48th IEEE Asilomar Conference on Signals, Systems, and …, 2014
52014
Covert communications in a dynamic interference environment
D Goeckel, A Sheikholeslami, T Sobers, BA Bash, O Towsley, S Guha
2018 IEEE 19th International Workshop on Signal Processing Advances in …, 2018
42018
Covert active sensing of linear systems
D Goeckel, BA Bash, A Sheikholeslami, S Guha, D Towsley
2017 51st Asilomar Conference on Signals, Systems, and Computers, 1692-1696, 2017
42017
Covert Communications in Multi-Channel Slotted ALOHA Systems
A Sheikholeslami, M Ghaderi, D Goeckel
IEEE Transactions on Mobile Computing, 2020
12020
Covert communications in packet collision channels
A Sheikholeslami, M Ghaderi, D Goeckel
2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2019
12019
Everlasting secrecy in wireless communications: Challenges and approaches
D Goeckel, A Sheikholeslami, C Capar
2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), 1-4, 2014
12014
Everlasting Secrecy by Exploiting Eavesdropper’s Receiver Non-idealities
A Sheikholeslami
University of Massachusetts Libraries, 2016
2016
Minimum Energy Routing in Wireless Networks in the Presence of Jamming
A Sheikholeslami, M Ghaderi, H Pishro-Nik
arXiv preprint arXiv:1411.3736, 2014
2014
On the Impact of Dynamic Jamming on End-to-End Delay in Linear Wireless Networks
A Sheikholeslami, H Pishro-nik, M Ghaderi, D Goeckel
IEEE Conference of Information Science and Systems (CISS), Princeton, NJ, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20