Azadeh Sheikholeslami

Orcid: 0000-0003-0839-6428

According to our database1, Azadeh Sheikholeslami authored at least 18 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A family of pairwise multi-marginal optimal transports that define a generalized metric.
Mach. Learn., January, 2023

2022
Covert Communications in Multi-Channel Slotted ALOHA Systems.
IEEE Trans. Mob. Comput., 2022

2019
Covert Communications in Packet Collision Channels.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

2018
Multi-Hop Routing in Covert Wireless Networks.
IEEE Trans. Wirel. Commun., 2018

Covert Communications in a Dynamic Interference Environment.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

2017
Energy-Efficient Secrecy in Wireless Networks Based on Random Jamming.
IEEE Trans. Commun., 2017

Covert active sensing of linear systems.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
Energy-Efficient Routing in Wireless Networks in the Presence of Jamming.
IEEE Trans. Wirel. Commun., 2016

Covert communication over classical-quantum channels.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments.
IEEE Trans. Wirel. Commun., 2015

2014
Minimum Energy Routing in Wireless Networks in the Presence of Jamming.
CoRR, 2014

Jamming-aware minimum energy routing in wireless networks.
Proceedings of the IEEE International Conference on Communications, 2014

On the impact of dynamic jamming on end-to-end delay in linear wireless networks.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

Everlasting secrecy in disadvantaged wireless environments against sophisticated eavesdroppers.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver.
IEEE J. Sel. Areas Commun., 2013

Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Physical layer security from inter-session interference in large wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012


  Loading...