Siddhartha Sarma

Orcid: 0000-0003-3008-7445

According to our database1, Siddhartha Sarma authored at least 21 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Wireless powered backscatter-aided cooperative communication scheme for IoT.
Wirel. Networks, 2022

Power Minimization in Multi-Antenna Transmitter Aided Bidirectional Tag-to-Device Communications for IoT.
IEEE Trans. Veh. Technol., 2022

2021
Making IPv6-over-BLE Energy-friendlier: An Adaptive Algorithm for Diverse Traffic.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

Transmit Power Minimization in Bidirectional Tag-to-Device Communications for IoT.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2019
Time-to-Recharge Analysis for Energy-Relay-Assisted Energy Harvesting.
IEEE Access, 2019

Cooperative Communication in Hybrid User Scenario incorporating Backscattering and Energy Harvesting.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
SNR based secure communication via untrusted amplify-and-forward relay nodes using artificial noise.
Wirel. Networks, 2018

2016
Robust Energy Harvesting Based on a Stackelberg Game.
IEEE Wirel. Commun. Lett., 2016

Robust Power Allocation and Outage Analysis for Secrecy in Independent Parallel Gaussian Channels.
IEEE Wirel. Commun. Lett., 2016

Urban monitoring using participatory sensing: An optimal budget allocation approach.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
Secure Communication in Amplify-and-Forward Networks with Multiple Eavesdroppers: Decoding with SNR Thresholds.
Wirel. Pers. Commun., 2015

Secure Transmission in Cooperative Networks with Weak Eavesdroppers.
IEEE Signal Process. Lett., 2015

QEP Based Solution for Power Allocation in Amplify and Forward Networks.
IEEE Commun. Lett., 2015

Secure Transmission in Amplify-and-Forward Diamond Networks with a Single Eavesdropper.
CoRR, 2015

Optimal power allocation for protective jamming in wireless networks: A flow based model.
Comput. Networks, 2015

Beating resource constrained eavesdroppers: A physical layer security study.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

2014
Beam-forming for Secure Communication in Amplify-and-Forward Networks: An SNR based approach.
CoRR, 2014

Secure Transmission in Amplify and Forward Networks for Multiple Degraded Eavesdroppers.
CoRR, 2014

Beamforming for Secure Communication via Untrusted Relay Nodes Using Artificial Noise.
CoRR, 2014

Maximizing transported data before partition in a wireless sensor network.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

2013
Joint scheduling & jamming for data secrecy in wireless networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013


  Loading...