Amitav Mukherjee

According to our database1, Amitav Mukherjee authored at least 69 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Energy Efficiency and Delay in 5G Ultra-Reliable Low-Latency Communications System Architectures.
IEEE Network, 2018

Coexistence of Contention-Based General Authorized Access Networks in 3.5 GHz CBRS Band.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Fog-Aided Data Reception in Next-Generation MIMO Radio Access Networks with Edge Sensing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Time-of-Arrival Estimation in Block-IFDMA Systems for LTE in Unlicensed Spectrum.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

HARQ Feedback in Unlicensed Spectrum LTE: Design and Performance Evaluation.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Uplink Performance of Enhanced Licensed Assisted Access (eLAA) in Unlicensed Spectrum.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Performance of Autonomous Uplink Transmissions in Unlicensed Spectrum LTE.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Design and Evaluation of Licensed Assisted Access LTE in Unlicensed Spectrum.
IEEE Wireless Commun., 2016

MIMO Cognitive Radio User Selection With and Without Primary Channel State Information.
IEEE Trans. Vehicular Technology, 2016

Spreading-Sequence Design for Partially Connected Multirelay Networks Under Multipath Fading.
IEEE Trans. Vehicular Technology, 2016

Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems.
IEEE Communications Letters, 2016

Licensed-Assisted Access LTE: coexistence with IEEE 802.11 and the evolution toward 5G.
IEEE Communications Magazine, 2016

Stochastic Geometry Analysis of Reference Signal Spoofing Attack in Wireless Cellular Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints.
Proceedings of the IEEE, 2015

Energy Reallocation in a Multi-User Network With a Shared Harvesting Module and Storage Battery.
IEEE Communications Letters, 2015

Underlay MIMO Cognitive Radio Downlink Scheduling with Multiple Primary Users and No CSI.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

CSI-unaware scheduling for coexistence of MIMO-OFDMA device-to-device links and cellular mobile terminals.
Proceedings of the 34th IEEE Military Communications Conference, 2015

System architecture and coexistence evaluation of licensed-assisted access LTE with IEEE 802.11.
Proceedings of the IEEE International Conference on Communication, 2015

2014
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2014

Macro-small cell grouping in dual connectivity LTE-B networks with non-ideal backhaul.
Proceedings of the IEEE International Conference on Communications, 2014

Optimal flow bifurcation in networks with dual base station connectivity and non-ideal backhaul.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Prescient Precoding in Heterogeneous DSA Networks with Both Underlay and Interweave MIMO Cognitive Radios.
IEEE Trans. Wireless Communications, 2013

Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper.
IEEE Trans. Signal Processing, 2013

Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels.
IEEE Trans. Signal Processing, 2013

Diffusion of Cooperative Behavior in Decentralized Cognitive Radio Networks With Selfish Spectrum Sensors.
J. Sel. Topics Signal Processing, 2013

Imbalanced Beamforming by a Multi-Antenna Source for Secure Utilization of an Untrusted Relay.
IEEE Communications Letters, 2013

Imbalanced Beamforming by a Multi-antenna Source for Secure Utilization of an Untrusted Relay
CoRR, 2013

Diffusion of Cooperative Behavior in Decentralized Cognitive Radio Networks with Selfish Spectrum Sensors
CoRR, 2013

Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels
CoRR, 2013

On the Detection of Passive Eavesdroppers in the MIMO Wiretap Channel.
CoRR, 2013

Coordinated beamforming for mutually interfering multi-antenna wlan networks with multipacket reception.
Proceedings of the IEEE International Conference on Acoustics, 2013

Queue-aware dynamic on/off switching of small cells in dense heterogeneous networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
Modified Waterfilling Algorithms for MIMO Spatial Multiplexing with Asymmetric CSI.
IEEE Wireless Commun. Letters, 2012

MIMO Precoding in Underlay Cognitive Radio Systems with Completely Unknown Primary CSI
CoRR, 2012

Energy-efficient device-to-device MIMO underlay network with interference constraints.
Proceedings of the International ITG Workshop on Smart Antennas, 2012

Outage performance for amplify-and-forward channels with an unauthenticated relay.
Proceedings of IEEE International Conference on Communications, 2012

Detecting passive eavesdroppers in the MIMO wiretap channel.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Rank minimization designs for underlay MIMO cognitive radio networks with completely unknown primary CSI.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Learning algorithms for energy-efficient MIMO antenna subset selection: Multi-armed bandit framework.
Proceedings of the 20th European Signal Processing Conference, 2012

Deploying multi-antenna energy-harvesting cooperative jammers in the MIMO wiretap channel.
Proceedings of the Conference Record of the Forty Sixth Asilomar Conference on Signals, 2012

2011
Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI.
IEEE Trans. Signal Processing, 2011

Prescient Beamforming by Primary Transmitters in Interweave Cognitive Radio Networks with a Single Primary Receiver
CoRR, 2011

Interference self-mitigating beamforming for the K-user MIMO IC.
Proceedings of the IEEE International Conference on Acoustics, 2011

Prescient beamforming in multi-user interweave cognitive radio networks.
Proceedings of the 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing, 2011

A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Coded DS-CDMA systems with iterative channel estimation and no pilot symbols.
IEEE Trans. Wireless Communications, 2010

General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks.
IEEE Trans. Communications, 2010

Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
CoRR, 2010

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
CoRR, 2010

Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
CoRR, 2010

Poisoned Feedback: The Impact of Malicious Users in Closed-Loop Multiuser MIMO Systems
CoRR, 2010

General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks
CoRR, 2010

Coded DS-CDMA Systems with Iterative Channel Estimation and no Pilot Symbols
CoRR, 2010

Hybrid Multi-Dimensional Modulation for Gaussian and Fading Channels.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Equilibrium Outcomes of Dynamic Games in MIMO Channels with Active Eavesdroppers.
Proceedings of IEEE International Conference on Communications, 2010

Ensuring Secrecy in MIMO Wiretap Channels with Imperfect CSIT: A Beamforming Approach.
Proceedings of IEEE International Conference on Communications, 2010

Poisoned feedback: The impact of malicious users in closed-loop multiuser mimo systems.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels
CoRR, 2009

Multicarrier Interleave-Division Multiple-Access Systems with IRA Coding and Adaptive Pilot Symbols.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

A Coalition Game Framework for Scheduling in Cooperative Diversity Networks.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

CSI-Adaptive Encoded Pilot Symbols for Iterative OFDM Receiver with IRA Coding.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

Group Diversity on the Uplink of a Dense Coded-Cooperation Network.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

Probabilistic Voting-Theoretic Strategies for Resource Allocation in Heterogenous Wireless Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Iterative EM channel estimation for turbo-coded DS-CDMA receiver under time-varying interference.
Proceedings of the 2008 International ITG Workshop on Smart Antennas, 2008

2007
Iterative EM Based LDPC CDMA Receiver under Time Varying Interference.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Compact Multi-user Wideband MIMO System using Multiple-Mode Microstrip Antennas.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Sum-Rate Reduction due to Limited Feedback in MIMO Broadcast Channels with Block-Diagonalization.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Sum-Rate Distortion in MIMO Broadcast Channels with Irregular Limited Feedback.
Proceedings of the Global Communications Conference, 2007


  Loading...