Picture for Chinmoy Kundu

Chinmoy Kundu

Joint Transmit and Jamming Power Optimization for Secrecy in Energy Harvesting Networks: A Reinforcement Learning Approach

Add code
Jul 24, 2024
Viaarxiv icon

Secrecy Analysis of CSI Ratio-Based Transmitter Selection with Unreliable Backhaul

Add code
Jun 04, 2024
Viaarxiv icon

Multi-task Learning-based Joint CSI Prediction and Predictive Transmitter Selection for Security

Add code
May 01, 2024
Viaarxiv icon

Opportunistic User Scheduling for Secure RIS-aided Wireless Communications

Add code
Mar 05, 2024
Viaarxiv icon

Destination Scheduling for Secure Pinhole-Based Power-Line Communication

Add code
Jun 06, 2023
Figure 1 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Figure 2 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Figure 3 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Figure 4 for Destination Scheduling for Secure Pinhole-Based Power-Line Communication
Viaarxiv icon

Secrecy of Opportunistic User Scheduling in RIS-Aided Systems: A Comparison with NOMA Scheduling

Add code
Jun 05, 2023
Viaarxiv icon

Transmitter Selection for Secrecy Against Colluding Eavesdroppers with Backhaul Uncertainty

Add code
Jan 02, 2023
Viaarxiv icon

Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading

Add code
Aug 30, 2022
Figure 1 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Figure 2 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Figure 3 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Figure 4 for Ergodic Secrecy Rate of Optimal Source-Destination Pair Selection in Frequency-Selective Fading
Viaarxiv icon

Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication

Add code
Aug 02, 2022
Figure 1 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Figure 2 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Figure 3 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Figure 4 for Optimal Friendly Jamming and Transmit Power Allocation in RIS-assisted Secure Communication
Viaarxiv icon

Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections

Add code
Mar 09, 2021
Figure 1 for Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections
Figure 2 for Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections
Figure 3 for Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections
Figure 4 for Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections
Viaarxiv icon