


default search action
Hesham El Gamal
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c91]Teng-Hui Huang, Hesham El Gamal:
An Efficient Difference-of-Convex Solver for Privacy Funnel. ISIT (Workshops) 2024: 1-6 - [c90]Armanpreet Pannu, Amr S. Helmy, Hesham El Gamal:
A Novel Multi-Photon Entangled State with Enhanced Resilience to Path Loss. ISIT (Workshops) 2024: 1-5 - [c89]Fatemeh Namadchi, Mahyar Shirvanimoghaddam, Hesham El Gamal:
A Parallel Concatenated Coding Scheme and List-Based Decoding Algorithm for URLLC. WCNC 2024: 1-6 - [i63]Teng-Hui Huang, Hesham El Gamal:
Efficient Solvers for Wyner Common Information with Application to Multi-Modal Clustering. CoRR abs/2402.14266 (2024) - [i62]Teng-Hui Huang, Hesham El Gamal:
An Efficient Difference-of-Convex Solver for Privacy Funnel. CoRR abs/2403.04778 (2024) - 2023
- [j63]Teng-Hui Huang
, Aly El Gamal, Hesham El Gamal:
A Linearly Convergent Douglas-Rachford Splitting Solver for Markovian Information-Theoretic Optimization Problems. IEEE Trans. Inf. Theory 69(5): 3372-3399 (2023) - [c88]Teng-Hui Huang
, Thilini Dahanayaka, Kanchana Thilakarathna, Philip H. W. Leong, Hesham El Gamal:
The Wyner Variational Autoencoder for Unsupervised Multi-Layer Wireless Fingerprinting. GLOBECOM 2023: 820-825 - [c87]Teng-Hui Huang
, Hesham El Gamal:
Efficient Alternating Minimization Solvers for Wyner Multi-View Unsupervised Learning. ISIT 2023: 707-712 - [i61]Teng-Hui Huang, Thilini Dahanayaka, Kanchana Thilakarathna, Philip H. W. Leong, Hesham El Gamal:
The Wyner Variational Autoencoder for Unsupervised Multi-Layer Wireless Fingerprinting. CoRR abs/2303.15860 (2023) - [i60]Teng-Hui Huang, Hesham El Gamal:
Efficient Alternating Minimization Solvers for Wyner Multi-View Unsupervised Learning. CoRR abs/2303.15866 (2023) - 2022
- [c86]Teng-Hui Huang
, Aly El Gamal, Hesham El Gamal:
Efficient Multi-View Learning Based on the Information Bottleneck Paradigm. IEEECONF 2022: 1393-1397 - [c85]Teng-Hui Huang
, Aly El Gamal, Hesham El Gamal:
On The Multi-View Information Bottleneck Representation. ITW 2022: 37-42 - [i59]Teng-Hui Huang, Aly El Gamal, Hesham El Gamal:
On the Multi-View Information Bottleneck Representation. CoRR abs/2202.02684 (2022) - [i58]Teng-Hui Huang, Aly El Gamal, Hesham El Gamal:
A Linearly Convergent Douglas-Rachford Splitting Solver for Markovian Information-Theoretic Optimization Problems. CoRR abs/2203.07527 (2022) - 2020
- [j62]Yousef AlHassoun
, Faisal Alotaibi, Aly El Gamal
, Hesham El Gamal:
On the Design and Analysis of Optimal Wireless Caching Schemes With Placement Cost and Unlimited Memory. IEEE Wirel. Commun. Lett. 9(9): 1374-1378 (2020)
2010 – 2019
- 2019
- [j61]Aly El Gamal
, Hesham El Gamal:
A Single Coin Monetary Mechanism for Distributed Cooperative Interference Management. IEEE Wirel. Commun. Lett. 8(3): 757-760 (2019) - [c84]Yousef AlHassoun
, Faisal Alotaibi, Aly El Gamal, Hesham El Gamal:
Efficient Coded Caching with Limited Memory. Allerton 2019: 268-275 - [c83]Yousef AlHassoun
, Faisal Alotaibi, Aly El Gamal, Hesham El Gamal:
Towards Jointly Optimal Placement and Delivery: To Code or Not to Code in Wireless Caching Networks. ISIT 2019: 2634-2638 - [i57]Sameh Hosny, Atilla Eryilmaz, Alhussein A. Abouzeid, Hesham El Gamal:
On the Performance of Mobility-Aware D2D Caching Networks. CoRR abs/1903.10071 (2019) - [i56]Yousef AlHassoun, Faisal Alotaibi, Aly El Gamal, Hesham El Gamal:
Optimal Wireless Caching with Placement Cost. CoRR abs/1912.07528 (2019) - 2018
- [i55]Aly El Gamal, Hesham El Gamal:
A Blockchain Example for Cooperative Interference Management. CoRR abs/1808.01538 (2018) - 2017
- [j60]Yara Abdallah, Zizhan Zheng
, Ness B. Shroff
, Hesham El Gamal, Tarek M. El-Fouly
:
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications. IEEE Trans. Control. Netw. Syst. 4(4): 886-898 (2017) - [c82]Amr Abdelaziz
, Can Emre Koksal, Hesham El Gamal, Ashraf D. Elbayoumy
:
On the compound MIMO wiretap channel with mean feedback. ISIT 2017: 734-738 - [i54]Amr Abdelaziz, Can Emre Koksal, Hesham El Gamal, Ashraf D. Elbayoumy:
On The Compound MIMO Wiretap Channel with Mean Feedback. CoRR abs/1701.07518 (2017) - 2016
- [j59]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Joint Smart Pricing and Proactive Content Caching for Mobile Services. IEEE/ACM Trans. Netw. 24(4): 2357-2371 (2016) - [j58]Ahmed A. Zewail, Yahya Mohasseb
, Mohammed Nafie, Hesham El Gamal:
Using network coding to achieve the capacity of deterministic relay networks with relay messages. Wirel. Commun. Mob. Comput. 16(15): 2390-2405 (2016) - [c81]Faisal Alotaibi
, Atilla Eryilmaz, Hesham El Gamal:
Dynamic pricing and proactive caching with unknown demand profile. Allerton 2016: 711-716 - [c80]Sameh Hosny
, Atilla Eryilmaz, Alhussein A. Abouzeid
, Hesham El Gamal:
Mobility-aware centralized D2D caching networks. Allerton 2016: 725-732 - [c79]Amr Abdelaziz
, Can Emre Koksal, Hesham El Gamal:
On the security of Angle of Arrival estimation. CNS 2016: 109-117 - [c78]Sameh Hosny
, Atilla Eryilmaz, Hesham El Gamal:
Impact of User Mobility on D2D Caching Networks. GLOBECOM 2016: 1-6 - [i53]Amr Abdelaziz, Can Emre Koksal, Hesham El Gamal:
On The Security of AoA Estimation. CoRR abs/1607.00467 (2016) - 2015
- [j57]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Proactive Content Download and User Demand Shaping for Data Networks. IEEE/ACM Trans. Netw. 23(6): 1917-1930 (2015) - [c77]Sameh Hosny
, Faisal Alotaibi
, Hesham El Gamal, Atilla Eryilmaz:
Towards a P2P mobile contents trading. ACSSC 2015: 338-342 - [c76]Faisal Alotaibi
, Sameh Hosny
, Hesham El Gamal, Atilla Eryilmaz:
A game theoretic approach to content trading in proactive wireless networks. ISIT 2015: 2216-2220 - [c75]Sameh Hosny
, Faisal Alotaibi
, Hesham El Gamal, Atilla Eryilmaz:
Towards a mobile content marketplace. SPAWC 2015: 675-679 - [i52]Yara Abdallah, Zizhan Zheng, Ness B. Shroff, Hesham El Gamal:
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications. CoRR abs/1502.06004 (2015) - [i51]Faisal Alotaibi, Sameh Hosny, John Tadrous, Hesham El Gamal, Atilla Eryilmaz:
Towards A Marketplace for Mobile Content: Dynamic Pricing and Proactive Caching. CoRR abs/1511.07573 (2015) - 2014
- [j56]Yang Yang, Jian Tan, Ness B. Shroff, Hesham El Gamal:
Delay Asymptotics With Retransmissions and Incremental Redundancy Codes Over Erasure Channels. IEEE Trans. Inf. Theory 60(3): 1932-1944 (2014) - [c74]Ahmed A. Zewail, Mohammed Nafie, Yahya Mohasseb
, Hesham El Gamal:
Achievable degrees of freedom region of MIMO relay networks using Detour Schemes. ICC 2014: 1860-1865 - [c73]Omar K. Shoukry, Mohamed A. Abd ElMohsen, John Tadrous, Hesham El Gamal, Tamer A. ElBatt, Nayer M. Wanas, Y. Elnakieb, M. Khairy:
Proactive scheduling for content pre-fetching in mobile networks. ICC 2014: 2848-2854 - [c72]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Joint pricing and proactive caching for data services: Global and user-centric approaches. INFOCOM Workshops 2014: 616-621 - [c71]John Tadrous, Hesham El Gamal, Atilla Eryilmaz:
Can carriers make more profit while users save money? ISIT 2014: 1757-1761 - [i50]Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal:
Using Network Coding to Achieve the Capacity of Deterministic Relay Networks with Relay Messages. CoRR abs/1404.4761 (2014) - 2013
- [j55]Karim Khalil, Onur Ozan Koyluoglu, Hesham El Gamal, Moustafa Youssef
:
Opportunistic Secrecy with a Strict Delay Constraint. IEEE Trans. Commun. 61(11): 4700-4709 (2013) - [j54]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Proactive Resource Allocation: Harnessing the Diversity and Multicast Gains. IEEE Trans. Inf. Theory 59(8): 4833-4854 (2013) - [j53]Onur Güngör, Jian Tan, Can Emre Koksal, Hesham El Gamal, Ness B. Shroff:
Secrecy Outage Capacity of Fading Channels. IEEE Trans. Inf. Theory 59(9): 5379-5397 (2013) - [j52]Aly El Gamal, Onur Ozan Koyluoglu, Moustafa Youssef
, Hesham El Gamal:
Achievable Secrecy Rate Regions for the Two-Way Wiretap Channel. IEEE Trans. Inf. Theory 59(12): 8099-8114 (2013) - [c70]Onur Güngör, Can Emre Koksal, Hesham El Gamal:
An information theoretic approach to RF fingerprinting. ACSSC 2013: 61-65 - [c69]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Pricing for demand shaping and proactive download in smart data networks. INFOCOM Workshops 2013: 321-326 - [c68]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Pricing for demand shaping and proactive download in smart data networks. INFOCOM 2013: 3189-3194 - [c67]Ahmed A. Zewail, Yahya Mohasseb
, Mohammed Nafie
, Hesham El Gamal:
The deterministic multicast capacity of 4-node relay networks. ISIT 2013: 804-808 - [c66]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Proactive Content Distribution for dynamic content. ISIT 2013: 1232-1236 - [c65]Onur Güngör, Can Emre Koksal, Hesham El Gamal:
On secrecy outage capacity of fading channels under relaxed delay constraints. ISIT 2013: 2024-2028 - [c64]Ahmed A. Zewail, Yahya Mohasseb
, Mohammed Nafie
, Hesham El Gamal:
The deterministic capacity of relay networks with relay private messages. ITW 2013: 1-5 - [c63]Mohamed A. Abd ElMohsen, Omar K. Shoukry, Hesham El Gamal, Tamer A. ElBatt, Nayer M. Wanas, Mohamed Abdel Raouf, Mostafa A. Zakaria, Ahmed I. Abdelkader, Hakem M. Zaied:
PAUL: proactive automated mobile user-centric content deLivery. MobiSys 2013: 515-516 - [i49]Ahmed A. Zewail, Mohammed Nafie, Yahya Mohasseb, Hesham El Gamal:
The Deterministic Multicast Capacity of 4-Node Relay Networks. CoRR abs/1304.4464 (2013) - [i48]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Proactive Data Download and User Demand Shaping for Data Networks. CoRR abs/1304.5745 (2013) - [i47]Ahmed A. Zewail, Yahya Mohasseb, Mohammed Nafie, Hesham El Gamal:
The Deterministic Capacity of Relay Networks with Relay Private Messages. CoRR abs/1308.1761 (2013) - 2012
- [j51]Onur Ozan Koyluoglu, Hesham El Gamal:
Polar Coding for Secure Transmission and Key Agreement. IEEE Trans. Inf. Forensics Secur. 7(5): 1472-1483 (2012) - [j50]Onur Ozan Koyluoglu, Can Emre Koksal, Hesham El Gamal:
On Secrecy Capacity Scaling in Wireless Networks. IEEE Trans. Inf. Theory 58(5): 3000-3015 (2012) - [c62]Yara Abdallah, Zizhan Zheng, Ness B. Shroff, Hesham El Gamal:
On the efficiency-vs-security tradeoff in the smart grid. CDC 2012: 1954-1959 - [c61]Onur Güngör, Jian Tan, Can Emre Koksal, Hesham El Gamal, Ness B. Shroff:
Secrecy outage capacity of fading channels. CISS 2012: 1-6 - [c60]Mohamed S. Nafea, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal:
On the diversity gain region of the Z-interference channels. ICC 2012: 2392-2397 - [c59]Mohamed S. Nafea, Doha Hamza, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal:
On the ARQ protocols over the Z-interference channels: Diversity-multiplexing-delay tradeoff. ISIT 2012: 3140-3144 - [i46]Mohamed S. Nafea, Doha Hamza, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal:
A Diversity-Multiplexing-Delay Tradeoff of ARQ Protocols in The Z-interference Channel. CoRR abs/1202.1740 (2012) - [i45]Mohamed S. Nafea, Karim G. Seddik, Mohammed Nafie, Hesham El Gamal:
On the Diversity Gain Region of the Z-interference Channels. CoRR abs/1202.2561 (2012) - [i44]Yang Yang, Jian Tan, Ness B. Shroff, Hesham El Gamal:
Delay Asymptotics with Retransmissions and Incremental Redundancy Codes over Erasure Channels. CoRR abs/1202.4661 (2012) - [i43]Yara Abdallah, Zizhan Zheng, Ness B. Shroff, Hesham El Gamal:
On the Efficiency-vs-Security Tradeoff in the Smart Grid. CoRR abs/1209.1763 (2012) - 2011
- [j49]Yara Abdallah, Mohamed Abdel Latif, Moustafa Youssef
, Ahmed K. Sultan
, Hesham El Gamal:
Keys Through ARQ: Theory and Practice. IEEE Trans. Inf. Forensics Secur. 6(3-1): 737-751 (2011) - [j48]Onur Ozan Koyluoglu, Hesham El Gamal, Lifeng Lai, H. Vincent Poor
:
Interference Alignment for Secrecy. IEEE Trans. Inf. Theory 57(6): 3323-3332 (2011) - [j47]Onur Ozan Koyluoglu, Hesham El Gamal:
Cooperative Encoding for Secrecy in Interference Channels. IEEE Trans. Inf. Theory 57(9): 5682-5694 (2011) - [j46]Lifeng Lai, Hesham El Gamal, Hai Jiang
, H. Vincent Poor
:
Cognitive Medium Access: Exploration, Exploitation, and Competition. IEEE Trans. Mob. Comput. 10(2): 239-253 (2011) - [c58]May Moussa, Mohammed Nafie
, Hesham El Gamal, Ayman F. Naguib:
On the utility of primary side information in cognitive sensing. ACSCC 2011: 1260-1264 - [c57]John Tadrous, Atilla Eryilmaz, Hesham El Gamal, Mohammed Nafie
:
Proactive resource allocation in cognitive networks. ACSCC 2011: 1425-1429 - [c56]Jian Tan, Yang Yang, Ness B. Shroff, Hesham El Gamal:
Delay asymptotics with retransmissions and fixed rate codes over erasure channels. INFOCOM 2011: 1260-1268 - [c55]Mohammad Shahmohammadi, Onur Ozan Koyluoglu, Tamer M. S. Khattab
, Hesham El Gamal:
On the degrees of freedom of the cognitive broadcast channel. ISIT 2011: 204-208 - [c54]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Proactive multicasting with predictable demands. ISIT 2011: 239-243 - [c53]Onur Güngör, Onur Ozan Koyluoglu, Hesham El Gamal, Can Emre Koksal:
Proactive source coding. ISIT 2011: 2213-2217 - [c52]Mohammad Shahmohammadi, Onur Ozan Koyluoglu, Tamer M. S. Khattab
, Hesham El Gamal:
Joint interference cancellation and dirty paper coding for cognitive cellular networks. WCNC 2011: 1972-1976 - [i42]John Tadrous, Atilla Eryilmaz, Hesham El Gamal:
Proactive Resource Allocation: Harnessing the Diversity and Multicast Gains. CoRR abs/1110.4703 (2011) - [i41]Onur Güngör, Jian Tan, Can Emre Koksal, Hesham El Gamal, Ness B. Shroff:
Secrecy Outage Capacity of Fading Channels. CoRR abs/1112.2791 (2011) - 2010
- [c51]Hesham El Gamal, John Tadrous, Atilla Eryilmaz:
Proactive resource allocation: Turning predictable behavior into spectral gain. Allerton 2010: 427-434 - [c50]Mohamed Elsabagh
, Yara Abdallah, Moustafa Youssef
, Hesham El Gamal:
ARQ security in Wi-Fi and RFID networks. Allerton 2010: 1212-1219 - [c49]Onur Güngör, Jian Tan, Can Emre Koksal, Hesham El Gamal, Ness B. Shroff:
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication. INFOCOM 2010: 677-685 - [c48]Elizabeth Toher, Onur Ozan Koyluoglu, Hesham El Gamal:
Secrecy games over the cognitive channel. ISIT 2010: 2637-2641 - [c47]Onur Ozan Koyluoglu, Can Emre Koksal, Hesham El Gamal:
On secrecy capacity scaling in wireless networks. ITA 2010: 229-232 - [c46]M. Mokhtar, Yahya Mohasseb
, Mohammed Nafie
, Hesham El Gamal:
On the deterministic multicast capacity of bidirectional relay networks. ITW 2010: 1-5 - [c45]Onur Ozan Koyluoglu, Hesham El Gamal:
Polar coding for secure transmission and key agreement. PIMRC 2010: 2698-2703 - [i40]Mohamed Oussama Damen, Hesham El Gamal, Ahmed A. Badr:
A New Class of TAST Codes With A Simplified Tree Structure. CoRR abs/1001.3206 (2010) - [i39]Onur Ozan Koyluoglu, Hesham El Gamal:
Polar Coding for Secure Transmission and Key Agreement. CoRR abs/1003.1422 (2010) - [i38]Yara Abdallah, Mohamed Abdel Latif, Moustafa Youssef, Ahmed K. Sultan, Hesham El Gamal:
Keys through ARQ: Theory and Practice. CoRR abs/1005.5063 (2010) - [i37]Aly El Gamal, Onur Ozan Koyluoglu, Moustafa Youssef, Hesham El Gamal:
The Two Way Wiretap Channel: Theory and Practice. CoRR abs/1006.0778 (2010) - [i36]Hesham El Gamal, John Tadrous, Atilla Eryilmaz:
Proactive Resource Allocation: Turning Predictable Behavior into Spectral Gain. CoRR abs/1010.1800 (2010) - [i35]Mohamed Elsabagh, Yara Abdallah, Moustafa Youssef, Hesham El Gamal:
ARQ Security in Wi-Fi and RFID Networks. CoRR abs/1010.3294 (2010)
2000 – 2009
- 2009
- [j45]Mérouane Debbah, Hesham El Gamal, H. Vincent Poor
, Shlomo Shamai (Shitz)
:
Wireless Physical Layer Security. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j44]Shih-Chun Lin, Mohammad Shahmohammadi, Hesham El Gamal:
Fingerprinting with minimum distance decoding. IEEE Trans. Inf. Forensics Secur. 4(1): 59-69 (2009) - [j43]Lifeng Lai, Hesham El Gamal, H. Vincent Poor
:
Authentication Over Noisy Channels. IEEE Trans. Inf. Theory 55(2): 906-916 (2009) - [j42]Onur Ozan Koyluoglu, Hesham El Gamal:
On power control and frequency reuse in the two user cognitive channel. IEEE Trans. Wirel. Commun. 8(7): 3546-3553 (2009) - [c44]Aly El Gamal, Moustafa Youssef
, Hesham El Gamal:
Randomization for Security in Half-Duplex Two-Way Gaussian Channels. GLOBECOM 2009: 1-6 - [c43]Mohamed Abdel Latif, Ahmed K. Sultan
, Hesham El Gamal:
ARQ-Based Secret Key Sharing. ICC 2009: 1-6 - [c42]Omar Mehanna, Ahmed K. Sultan
, Hesham El Gamal:
Blind Cognitive MAC Protocols. ICC 2009: 1-5 - [c41]Yahya Mohasseb
, Hassan Ghozlan, Gerhard Kramer
, Hesham El Gamal:
The MIMO Wireless Switch: Relaying can increase the multiplexing gain. ISIT 2009: 1448-1452 - [c40]Onur Ozan Koyluoglu, Mohammad Shahmohammadi, Hesham El Gamal:
A new achievable rate region for the discrete memoryless X channel. ISIT 2009: 2427-2431 - [c39]Karim Khalil, Moustafa Youssef
, Onur Ozan Koyluoglu, Hesham El Gamal:
On the delay limited secrecy capacity of fading channels. ISIT 2009: 2617-2621 - [i34]Hassan Ghozlan, Yahya Mohasseb, Hesham El Gamal, Gerhard Kramer:
The MIMO Wireless Switch: Relaying Can Increase the Multiplexing Gain. CoRR abs/0901.2588 (2009) - [i33]Karim Khalil, Moustafa Youssef, Onur Ozan Koyluoglu, Hesham El Gamal:
On the Delay Limited Secrecy Capacity of Fading Channels. CoRR abs/0901.2616 (2009) - [i32]Onur Ozan Koyluoglu, Hesham El Gamal:
On the Secrecy Rate Region for the Interference Channel. CoRR abs/0905.0036 (2009) - [i31]Onur Ozan Koyluoglu, Hesham El Gamal:
Cooperative Binning and Channel Prefixing for Secrecy in Interference Channels. CoRR abs/0905.3934 (2009) - [i30]Karim Khalil, Onur Ozan Koyluoglu, Hesham El Gamal, Moustafa Youssef:
Opportunistic Secrecy with a Strict Delay Constraint. CoRR abs/0907.3341 (2009) - [i29]Omar Mehanna, Ahmed K. Sultan, Hesham El Gamal:
Cognitive MAC Protocols for General Primary Network Models. CoRR abs/0907.4031 (2009) - [i28]Mohamed Abdel Latif, Ahmed K. Sultan, Hesham El Gamal:
Keys through ARQ. CoRR abs/0908.0014 (2009) - [i27]Onur Ozan Koyluoglu, Can Emre Koksal, Hesham El Gamal:
On Secrecy Capacity Scaling in Wireless Networks. CoRR abs/0908.0898 (2009) - [i26]Yara Omar, Moustafa Youssef, Hesham El Gamal:
ARQ Secrecy: From Theory to Practice. CoRR abs/0908.2328 (2009) - [i25]Aly El Gamal, Moustafa Youssef, Hesham El Gamal:
Randomization for Security in Half-Duplex Two-Way Gaussian Channels. CoRR abs/0908.3710 (2009) - 2008
- [j41]Kambiz Azarian, Hesham El Gamal, Philip Schniter
:
On the Optimality of the ARQ-DDF Protocol. IEEE Trans. Inf. Theory 54(4): 1718-1724 (2008) - [j40]Lifeng Lai, Hesham El Gamal:
The Water-Filling Game in Fading Multiple-Access Channels. IEEE Trans. Inf. Theory 54(5): 2110-2122 (2008) - [j39]Hon Fah Chong, Mehul Motani
, Hari Krishna Garg, Hesham El Gamal:
On The Han-Kobayashi Region for theInterference Channel. IEEE Trans. Inf. Theory 54(7): 3188-3195 (2008) - [j38]Lifeng Lai, Hesham El Gamal:
The Relay-Eavesdropper Channel: Cooperation for Secrecy. IEEE Trans. Inf. Theory 54(9): 4005-4019 (2008) - [j37]Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal:
On the Secrecy Capacity of Fading Channels. IEEE Trans. Inf. Theory 54(10): 4687-4698 (2008) - [j36]