Picture for Vaibhav Kumar

Vaibhav Kumar

Design of Uplink ISAC Systems with Cooperative Sensing: Power Control and Receive Beamforming

Add code
Mar 18, 2026
Viaarxiv icon

Beyond the Limits of Rigid Arrays: Flexible Intelligent Metasurfaces for Next-Generation Wireless Networks

Add code
Mar 12, 2026
Viaarxiv icon

Exploiting Structural Flexibility in SIM-Enabled Communications: From Adaptive Inter-Layer Spacing to Fully Morphable Layers

Add code
Feb 12, 2026
Viaarxiv icon

Flexible Intelligent Metasurface for Downlink Communications under Statistical CSI

Add code
Dec 28, 2025
Viaarxiv icon

Hiding in Plain Sight: RIS-Aided Target Obfuscation in ISAC

Add code
Mar 07, 2025
Viaarxiv icon

Beamforming Design for Secure RIS-Enabled ISAC: Passive RIS vs. Active RIS

Add code
Jan 31, 2025
Viaarxiv icon

PAFFA: Premeditated Actions For Fast Agents

Add code
Dec 10, 2024
Figure 1 for PAFFA: Premeditated Actions For Fast Agents
Figure 2 for PAFFA: Premeditated Actions For Fast Agents
Figure 3 for PAFFA: Premeditated Actions For Fast Agents
Figure 4 for PAFFA: Premeditated Actions For Fast Agents
Viaarxiv icon

Optimal Beamforming Design for ISAC with Sensor-Aided Active RIS

Add code
Oct 16, 2024
Viaarxiv icon

Multi-Functional RIS for a Multi-Functional System: Integrating Sensing, Communication, and Wireless Power Transfer

Add code
Oct 11, 2024
Figure 1 for Multi-Functional RIS for a Multi-Functional System: Integrating Sensing, Communication, and Wireless Power Transfer
Figure 2 for Multi-Functional RIS for a Multi-Functional System: Integrating Sensing, Communication, and Wireless Power Transfer
Figure 3 for Multi-Functional RIS for a Multi-Functional System: Integrating Sensing, Communication, and Wireless Power Transfer
Figure 4 for Multi-Functional RIS for a Multi-Functional System: Integrating Sensing, Communication, and Wireless Power Transfer
Viaarxiv icon

Breaking Down the Defenses: A Comparative Survey of Attacks on Large Language Models

Add code
Mar 03, 2024
Figure 1 for Breaking Down the Defenses: A Comparative Survey of Attacks on Large Language Models
Figure 2 for Breaking Down the Defenses: A Comparative Survey of Attacks on Large Language Models
Viaarxiv icon