Shahid Mehraj Shah

Orcid: 0000-0002-8583-7904

According to our database1, Shahid Mehraj Shah authored at least 17 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A lightweight mini-batch federated learning approach for attack detection in IoT.
Internet Things, April, 2024

Bayesian Game Formulation of Power Allocation in Multiple Access Wiretap Channel with Incomplete CSI.
Proceedings of the National Conference on Communications, 2024

2023
Achievable Sum-rate of variants of QAM over Gaussian Multiple Access Channel with and without security.
CoRR, 2023

2022
Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network.
CoRR, 2022

FEAT: Fair Coordinated Iterative Water-Filling Algorithm.
CoRR, 2022

Unsupervised ensemble based deep learning approach for attack detection in IoT network.
Concurr. Comput. Pract. Exp., 2022

Fair Iterative Water-Filling Game for Multiple Access Channels.
Proceedings of the International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems on International Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2022

2020
Optimal rotation angle for finite constellation over additive white Gaussian noise multiple access wiretap channel.
IET Commun., 2020

Enhancing secrecy rates in a wiretap channel.
Digit. Commun. Networks, 2020

2017
Resource allocation in a MAC with and without security via game theoretic learning.
EURASIP J. Wirel. Commun. Netw., 2017

2016
Resource allocation in fading multiple access wiretap channel via game theoretic learning.
Proceedings of the 2016 Information Theory and Applications Workshop, 2016

2015
Mitigating Rate Loss in Fading Multiple Access Wiretap Channel to achieve Shannon Capacity Region.
CoRR, 2015

Achieving Shannon Capacity in a Fading Wiretap Channel.
CoRR, 2015

Achieving shannon capacity region as secrecy rate region in a multiple access wiretap channel.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

2013
Previous messages provide the key to achieve shannon capacity in a wiretap channel.
Proceedings of the IEEE International Conference on Communications, 2013

2012
On secrecy above secrecy capacity.
Proceedings of the IEEE International Conference on Communication Systems, 2012

2011
Achievable Secrecy Sum-Rate in a Fading MAC-WT with Power Control and without CSI of Eavesdropper
CoRR, 2011


  Loading...