Follow
Azadeh Sheikholeslami
Title
Cited by
Cited by
Year
Multi-hop routing in covert wireless networks
A Sheikholeslami, M Ghaderi, D Towsley, BA Bash, S Guha, D Goeckel
IEEE Transactions on Wireless Communications 17 (6), 3656-3669, 2018
722018
Physical layer security from inter-session interference in large wireless networks
A Sheikholeslami, D Goeckel, H Pishro-Nik, D Towsley
2012 Proceedings IEEE INFOCOM, 1179-1187, 2012
552012
Covert communication over classical-quantum channels
A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha
2016 IEEE International Symposium on Information Theory (ISIT), 2064-2068, 2016
442016
Energy-efficient routing in wireless networks in the presence of jamming
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
IEEE Transactions on Wireless Communications 15 (10), 6828-6842, 2016
252016
Everlasting Secrecy by Exploiting Non-Idealities of the Eavesdropper's Receiver
A Sheikholeslami, D Goeckel, H Pishro-nik
Selected Areas in Communications, IEEE Journal on 31 (9), 1828 - 1839, 2013
232013
Jamming-aware minimum energy routing in wireless networks
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
2014 IEEE International Conference on Communications (ICC), 2313-2318, 2014
222014
2016 IEEE International Symposium on Information Theory (ISIT)
A Sheikholeslami, BA Bash, D Towsley, D Goeckel, S Guha
IEEE, 2016
202016
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy
A Sheikholeslami, D Goeckel, H Pishro-Nik
2013 IEEE International Symposium on Information Theory, 2950-2954, 2013
142013
Energy-efficient secrecy in wireless networks based on random jamming
A Sheikholeslami, M Ghaderi, H Pishro-Nik, D Goeckel
IEEE Transactions on Communications 65 (6), 2522-2533, 2017
132017
Covert active sensing of linear systems
D Goeckel, BA Bash, A Sheikholeslami, S Guha, D Towsley
2017 51st Asilomar Conference on Signals, Systems, and Computers, 1692-1696, 2017
122017
Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments
A Sheikholeslami, D Goeckel, H Pishro-Nik
IEEE Transactions on Wireless Communications, 2015
112015
Covert communications in a dynamic interference environment
D Goeckel, A Sheikholeslami, T Sobers, BA Bash, O Towsley, S Guha
2018 IEEE 19th International Workshop on Signal Processing Advances in …, 2018
102018
Exploiting the non-commutativity of nonlinear operators for information-theoretic security in disadvantaged wireless environments
A Sheikholeslami, D Goeckel, H Pishro-Nik
2012 50th Annual Allerton Conference on Communication, Control, and …, 2012
62012
A family of pairwise multi-marginal optimal transports that define a generalized metric
L Mi, A Sheikholeslami, J Bento
Machine Learning 112 (1), 353-384, 2023
52023
Everlasting Secrecy in Disadvantaged Wireless Environments against Sophisticated Eavesdroppers
A Sheikholeslami, D Goeckel, H Pishro-nik
Proceedings of 48th IEEE Asilomar Conference on Signals, Systems, and …, 2014
52014
Covert communications in multi-channel slotted ALOHA systems
A Sheikholeslami, M Ghaderi, D Goeckel
IEEE Transactions on Mobile Computing 21 (6), 1958-1971, 2020
42020
Covert communications in packet collision channels
A Sheikholeslami, M Ghaderi, D Goeckel
2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2019
22019
Everlasting secrecy in wireless communications: Challenges and approaches
D Goeckel, A Sheikholeslami, C Capar
2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), 1-4, 2014
12014
On the Impact of Dynamic Jamming on End-to-End Delay in Linear Wireless Networks
A Sheikholeslami, H Pishro-nik, M Ghaderi, D Goeckel
IEEE Conference of Information Science and Systems (CISS), Princeton, NJ, 2014
12014
Everlasting Secrecy by Exploiting Eavesdropper's Receiver Non-idealities
A Sheikholeslami
University of Massachusetts Libraries, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20