default search action
Muhammad R. A. Khandaker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Kenneth Ikeagu, Muhammad R. A. Khandaker, Chaoyun Song, Yuan Ding:
Deep Learning-Based Hybrid Beamforming Design for IRS-Aided MIMO Communication. IEEE Wirel. Commun. Lett. 13(2): 461-465 (2024) - 2023
- [j32]Md. Emdadul Haque, Faisal Tariq, Muhammad R. A. Khandaker, Kai-Kit Wong, Yangyang Zhang:
A Survey of Scheduling in 5G URLLC and Outlook for Emerging 6G Systems. IEEE Access 11: 34372-34396 (2023) - [j31]Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai:
Secure data collection via UAV-carried IRS. ICT Express 9(4): 706-713 (2023) - [c28]Saniul Alam, Sadia Islam, Muhammad R. A. Khandaker, Risala T. Khan, Faisal Tariq, Apriana Toding:
Deep Q-Learning Based Resource Allocation in 6G Interference Systems With Outage Constraints. VTC2023-Spring 2023: 1-6 - 2022
- [j30]Shakila Zaman, Muhammad R. A. Khandaker, Risala T. Khan, Faisal Tariq, Kai-Kit Wong:
Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare. IEEE Access 10: 37064-37081 (2022) - [i26]Saniul Alam, Sadia Islam, Muhammad R. A. Khandaker, Risala T. Khan, Faisal Tariq, Apriana Toding:
Deep Q-Learning Based Resource Allocation in Interference Systems With Outage Constraint. CoRR abs/2203.02791 (2022) - 2021
- [j29]Vishal A. Thakor, Mohammad Abdur Razzaque, Muhammad R. A. Khandaker:
Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. IEEE Access 9: 28177-28193 (2021) - [c27]Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai:
Secrecy Rate Maximization with Gridded UAV Swarm Jamming for passive Eavesdropping. GLOBECOM 2021: 1-6 - [c26]Yizhuo Song, Muhammad R. A. Khandaker, Faisal Tariq, Kai-Kit Wong, Apriana Toding:
Truly Intelligent Reflecting Surface-Aided Secure Communication Using Deep Learning. VTC Spring 2021: 1-6 - [i25]Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai:
Joint Beamforming and Location Optimization for Secure Data Collection in Wireless Sensor Networks with UAV-Carried Intelligent Reflecting Surface. CoRR abs/2101.06565 (2021) - [i24]Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai:
Gridded UAV Swarm for Secrecy Rate Maximization with Unknown Eavesdropper. CoRR abs/2102.03428 (2021) - [i23]Shakila Zaman, Muhammad R. A. Khandaker, Risala T. Khan, Faisal Tariq, Kai-Kit Wong:
Thinking Out of the Blocks: Holochain for Distributed Security in IoT Healthcare. CoRR abs/2103.01322 (2021) - 2020
- [j28]Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai:
UAV-Aided Jamming for Secure Ground Communication With Unknown Eavesdropper Location. IEEE Access 8: 72881-72892 (2020) - [j27]Md. Tanvir Rahman, Risala T. Khan, Muhammad R. A. Khandaker, Mathini Sellathurai, Md. Sifat Ar Salan:
An Automated Contact Tracing Approach for Controlling Covid-19 Spread Based on Geolocation Data From Mobile Cellular Networks. IEEE Access 8: 213554-213565 (2020) - [j26]Faisal Tariq, Muhammad R. A. Khandaker, Kai-Kit Wong, Muhammad Ali Imran, Mehdi Bennis, Mérouane Debbah:
A Speculative Study on 6G. IEEE Wirel. Commun. 27(4): 118-125 (2020) - [c25]Guan-Xiong Shen, Muhammad R. A. Khandaker, Faisal Tariq:
Learning the Wireless Channel: A Deep Neural Network Approach. UCET 2020: 1-6 - [i22]Yizhuo Song, Muhammad R. A. Khandaker, Faisal Tariq, Kai-Kit Wong:
Truly Intelligent Reflecting Surface-Aided Secure Communication Using Deep Learning. CoRR abs/2004.03056 (2020) - [i21]Vishal A. Thakor, Mohammad Abdur Razzaque, Muhammad R. A. Khandaker:
Lightweight Cryptography for IoT: A State-of-the-Art. CoRR abs/2006.13813 (2020) - [i20]Md. Tanvir Rahman, Risala T. Khan, Muhammad R. A. Khandaker, Md. Sifat Ar Salan:
An Automated Contact Tracing Approach for Controlling Covid-19 Spread Based on Geolocation Data from Mobile Cellular Networks. CoRR abs/2007.02661 (2020)
2010 – 2019
- 2019
- [j25]Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong, Stelios Timotheou:
Secure SWIPT by Exploiting Constructive Interference and Artificial Noise. IEEE Trans. Commun. 67(2): 1326-1340 (2019) - [c24]Jin Gao, Muhammad R. A. Khandaker, Faisal Tariq, Kai-Kit Wong, Risala T. Khan:
Deep Neural Network Based Resource Allocation for V2X Communications. VTC Fall 2019: 1-5 - [c23]Tian-Hao Li, Muhammad R. A. Khandaker, Faisal Tariq, Kai-Kit Wong, Risala T. Khan:
Learning the Wireless V2I Channels Using Deep Neural Networks. VTC Fall 2019: 1-5 - [c22]Mahmoud T. Kabir, Muhammad R. A. Khandaker, Christos Masouros:
A Scalable Performance-Complexity Trade-off for Full Duplex Beamforming. WCNC 2019: 1-6 - [c21]Mahmoud T. Kabir, Muhammad R. A. Khandaker, Christos Masouros:
Minimizing Energy and Latency in FD MEC Through Multi-objective Optimization. WCNC 2019: 1-6 - [i19]Faisal Tariq, Muhammad R. A. Khandaker, Kai-Kit Wong, Muhammad Ali Imran, Mehdi Bennis, Mérouane Debbah:
A Speculative Study on 6G. CoRR abs/1902.06700 (2019) - [i18]Jin Gao, Muhammad R. A. Khandaker, Faisal Tariq, Kai-Kit Wong, Risala T. Khan:
Deep Neural Network Based Resource Allocation for V2X Communications. CoRR abs/1906.10194 (2019) - [i17]Tian-Hao Li, Muhammad R. A. Khandaker, Faisal Tariq, Kai-Kit Wong, Risala T. Khan:
Learning the Wireless V2I Channels Using Deep Neural Networks. CoRR abs/1907.04831 (2019) - [i16]Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai:
UAV-Aided Jamming for Secure Ground Communication with Unknown Eavesdropper Location. CoRR abs/1911.11279 (2019) - 2018
- [j24]Mahmoud T. Kabir, Muhammad R. A. Khandaker, Christos Masouros:
Robust Energy Harvesting FD Transmission: Interference Suppression Versus Exploitation. IEEE Commun. Lett. 22(9): 1866-1869 (2018) - [j23]Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong:
Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security. IEEE Trans. Inf. Forensics Secur. 13(9): 2256-2268 (2018) - [j22]Amrita Mukherjee, Tamaghna Acharya, Muhammad R. A. Khandaker:
Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications. IEEE Trans. Veh. Technol. 67(9): 9032-9036 (2018) - [j21]Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad R. A. Khandaker:
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks. IEEE Trans. Wirel. Commun. 17(7): 4302-4314 (2018) - [j20]Mahmoud T. Kabir, Muhammad R. A. Khandaker, Christos Masouros:
Interference Exploitation in Full-Duplex Communications: Trading Interference Power for Both Uplink and Downlink Power Savings. IEEE Trans. Wirel. Commun. 17(12): 8314-8329 (2018) - [j19]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng, Yangyang Zhang, Zhongbin Zheng:
Secure Full-Duplex Two-Way Relaying for SWIPT. IEEE Wirel. Commun. Lett. 7(3): 336-339 (2018) - 2017
- [j18]Muhammad R. A. Khandaker, Kai-Kit Wong:
Joint source and relay optimization for interference MIMO relay networks. EURASIP J. Adv. Signal Process. 2017: 24 (2017) - [j17]Jialing Liao, Kai-Kit Wong, Muhammad R. A. Khandaker, Zhongbin Zheng:
Optimizing Cache Placement for Heterogeneous Small Cell Networks. IEEE Commun. Lett. 21(1): 120-123 (2017) - [j16]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng, Yangyang Zhang, Zhongbin Zheng, Ruopeng Liu:
SWIPT in MISO full-duplex systems. J. Commun. Networks 19(5): 470-480 (2017) - [j15]Muhammad R. A. Khandaker, Kai-Kit Wong, Yangyang Zhang, Zhongbin Zheng:
Probabilistically Robust SWIPT for Secrecy MISOME Systems. IEEE Trans. Inf. Forensics Secur. 12(1): 211-226 (2017) - [j14]Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng:
Truth-Telling Mechanism for Two-Way Relay Selection for Secrecy Communications With Energy-Harvesting Revenue. IEEE Trans. Wirel. Commun. 16(5): 3111-3123 (2017) - [c20]Md. S. Hossain, Faisal Tariq, Ghazanfar Ali Safdar, Nurul Huda Mahmood, Muhammad R. A. Khandaker:
Multi-Layer Soft Frequency Reuse Scheme for 5G Heterogeneous Cellular Networks. GLOBECOM Workshops 2017: 1-6 - [c19]Mahmoud T. Kabir, Muhammad R. A. Khandaker, Christos Masouros:
Reducing Self-Interference in Full Duplex Transmission by Interference Exploitation. GLOBECOM 2017: 1-6 - [c18]Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong:
Secure Full-Duplex Device-to-Device Communication. GLOBECOM Workshops 2017: 1-6 - [c17]Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong:
Constructive interference based secure precoding. ISIT 2017: 2875-2879 - [i15]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng, Yangyang Zhang, Zhongbin Zheng:
Simultaneous Wireless Information and Power Transfer in MISO Full-Duplex Systems. CoRR abs/1703.05752 (2017) - [i14]Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng:
Truth-Telling Mechanism for Secure Two-Way Relay Communications with Energy-Harvesting Revenue. CoRR abs/1703.06547 (2017) - [i13]Muhammad R. A. Khandaker, Kai-Kit Wong:
One- and Two-Way Relay Optimization for MIMO Interference Networks. CoRR abs/1703.09029 (2017) - [i12]Jialing Liao, Muhammad R. A. Khandaker, Kai-Kit Wong:
Energy Harvesting Enabled MIMO Relaying through PS. CoRR abs/1703.10314 (2017) - [i11]Mahmoud T. Kabir, Muhammad R. A. Khandaker, Christos Masouros:
Interference Exploitation in Full Duplex Communications: Trading Interference Power for Both Uplink and Downlink Power Savings. CoRR abs/1703.10666 (2017) - [i10]Amrita Mukherjee, Tamaghna Acharya, Muhammad R. A. Khandaker:
Outage Analysis for SWIPT-Enabled Two-Way Cognitive Cooperative Communications. CoRR abs/1704.01282 (2017) - [i9]Jialing Liao, Muhammad R. A. Khandaker, Kai-Kit Wong:
Energy Harvesting Enabled MIMO Relaying through Time Switching. CoRR abs/1704.02907 (2017) - [i8]Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad R. A. Khandaker:
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks. CoRR abs/1709.01334 (2017) - [i7]Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong:
Secure Full-Duplex Device-to-Device Communication. CoRR abs/1709.02340 (2017) - [i6]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Gan Zheng, Yangyang Zhang, Zhongbin Zheng:
Secure Full-Duplex Two-Way Relaying for SWIPT. CoRR abs/1709.08237 (2017) - 2016
- [j13]Jialing Liao, Muhammad R. A. Khandaker, Kai-Kit Wong:
Robust Power-Splitting SWIPT Beamforming for Broadcast Channels. IEEE Commun. Lett. 20(1): 181-184 (2016) - [j12]Muhammad R. A. Khandaker, Kai-Kit Wong, Haitao Zhao, Shamik Sengupta:
Guest Editorial for the Special Issue on Self-Optimizing Cognitive Radio Technologies. Phys. Commun. 19: 81-83 (2016) - [c16]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong:
Two-way beamforming optimization for full-duplex SWIPT systems. EUSIPCO 2016: 2375-2379 - [c15]Muhammad R. A. Khandaker, Kai-Kit Wong:
Robust Secrecy Beamforming for MIMO SWIPT with Probabilistic Constraints. GLOBECOM Workshops 2016: 1-6 - [c14]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Zhongbin Zheng:
Joint Transmit Power and Relay Two-Way Beamforming Optimization for Energy-Harvesting Full-Duplex Communications. GLOBECOM Workshops 2016: 1-6 - [c13]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong:
Wireless information and power transfer in full-duplex communication systems. ICC 2016: 1-6 - [c12]Jialing Liao, Muhammad R. A. Khandaker, Kai-Kit Wong:
Energy harvesting enabled MIMO relaying through power splitting. SPAWC 2016: 1-5 - [i5]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong:
Wireless Information and Power Transfer in Full-Duplex Communication Systems. CoRR abs/1603.02182 (2016) - [i4]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong:
Two-way beamforming optimization for full-duplex SWIPT systems. CoRR abs/1606.08651 (2016) - [i3]Muhammad R. A. Khandaker, Kai-Kit Wong, Yangyang Zhang, Zhongbin Zheng:
Probabilistically Robust SWIPT for Secrecy MISOME Systems. CoRR abs/1608.08576 (2016) - [i2]Alexander A. Okandeji, Muhammad R. A. Khandaker, Kai-Kit Wong, Zhongbin Zheng:
Joint Transmit Power and Relay Two-Way Beamforming Optimization for Energy-Harvesting Full-Duplex Communications. CoRR abs/1610.04644 (2016) - [i1]Muhammad R. A. Khandaker, Christos Masouros, Kai-Kit Wong:
Constructive Interference Based Secure Precoding: A New Dimension in Physical Layer Security. CoRR abs/1612.08465 (2016) - 2015
- [j11]Muhammad R. A. Khandaker, Kai-Kit Wong:
Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers. IEEE Trans. Inf. Forensics Secur. 10(1): 40-54 (2015) - [j10]Muhammad R. A. Khandaker, Kai-Kit Wong:
Robust Secrecy Beamforming With Energy-Harvesting Eavesdroppers. IEEE Wirel. Commun. Lett. 4(1): 10-13 (2015) - [c11]Muhammad R. A. Khandaker, Kai-Kit Wong:
Simultaneous information and power transfer in MISO interference systems. ChinaSIP 2015: 596-600 - [c10]Muhammad R. A. Khandaker, Kai-Kit Wong:
Max-min energy based robust secure beamforming for SWIPT. ICC 2015: 166-171 - 2014
- [j9]Apriana Toding, Muhammad R. A. Khandaker, Yue Rong:
Joint Source and Relay Design for MIMO Multi-Relay Systems Using Projected Gradient Approach. EURASIP J. Wirel. Commun. Netw. 2014: 151 (2014) - [j8]Muhammad R. A. Khandaker, Yue Rong:
Transceiver Optimization for Multi-Hop MIMO Relay Multicasting From Multiple Sources. IEEE Trans. Wirel. Commun. 13(9): 5162-5172 (2014) - [j7]Muhammad R. A. Khandaker, Kai-Kit Wong:
SWIPT in MISO Multicasting Systems. IEEE Wirel. Commun. Lett. 3(3): 277-280 (2014) - [c9]Muhammad R. A. Khandaker, Yue Rong:
Simplified MIMO relay design for multicasting from multiple-sources. ICASSP 2014: 2739-2743 - [c8]Apriana Toding, Muhammad R. A. Khandaker, Yue Rong:
Transceiver optimization for MIMO multi-relay systems using projected gradient approach. ISITA 2014: 635-639 - [c7]Muhammad R. A. Khandaker, Kai-Kit Wong:
QoS-based multicast beamforming for SWIPT. SECON Workshops 2014: 62-67 - [c6]Ali Cagatay Cirik, Muhammad R. A. Khandaker, Yue Rong, Yingbo Hua:
On uplink-downlink sum-MSE duality of multi-hop MIMO relay channel. SPAWC 2014: 279-283 - 2013
- [j6]Muhammad R. A. Khandaker, Yue Rong:
Precoding Design for MIMO Relay Multicasting. IEEE Trans. Wirel. Commun. 12(7): 3544-3555 (2013) - 2012
- [j5]Apriana Toding, Muhammad R. A. Khandaker, Yue Rong:
Joint source and relay optimization for parallel MIMO relay networks. EURASIP J. Adv. Signal Process. 2012: 174 (2012) - [j4]Muhammad R. A. Khandaker, Yue Rong:
Joint Transceiver Optimization for Multiuser MIMO Relay Communication Systems. IEEE Trans. Signal Process. 60(11): 5977-5986 (2012) - [j3]Muhammad R. A. Khandaker, Yue Rong:
Interference MIMO Relay Channel: Joint Power Control and Transceiver-Relay Beamforming. IEEE Trans. Signal Process. 60(12): 6509-6518 (2012) - [j2]Yue Rong, Muhammad R. A. Khandaker, Yong Xiang:
Channel Estimation of Dual-Hop MIMO Relay System via Parallel Factor Analysis. IEEE Trans. Wirel. Commun. 11(6): 2224-2233 (2012) - [c5]Muhammad R. A. Khandaker, Yue Rong:
Multicasting MIMO relay optimization based on min-max MSE criterion. ICCS 2012: 16-20 - 2011
- [j1]Yue Rong, Muhammad R. A. Khandaker:
On Uplink-Downlink Duality of Multi-Hop MIMO Relay Channel. IEEE Trans. Wirel. Commun. 10(6): 1923-1931 (2011) - [c4]Muhammad R. A. Khandaker, Yue Rong:
Joint power control and beamforming for interference MIMO relay channel. APCC 2011: 182-187 - [c3]Yue Rong, Muhammad R. A. Khandaker:
Channel estimation of dual-hop MIMO relay systems using parallel factor analysis. APCC 2011: 278-283 - [c2]Apriana Toding, Muhammad R. A. Khandaker, Yue Rong:
Joint source and relay optimization for distributed MIMO relay system. APCC 2011: 604-608 - [c1]Muhammad R. A. Khandaker, Yue Rong:
Joint power control and beamforming for peer-to-peer MIMO relay systems. WCSP 2011: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint