default search action
Bahareh Akhbari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i11]Ali Nikkhah, Morteza Shoushtari, Bahareh Akhbari, Willie K. Harrison:
Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming. CoRR abs/2401.07141 (2024) - [i10]Saleh Darzi, Bahareh Akhbari, Hassan Khodaiemehr:
Improving Privacy-Preserving Techniques for Smart Grid using Lattice-based Cryptography. CoRR abs/2404.16865 (2024) - 2023
- [j21]Hossein Ghavami, Bahareh Akhbari:
Secrecy performance analysis of IRS-NOMA systems. EURASIP J. Wirel. Commun. Netw. 2023(1): 57 (2023) - [j20]Atena Ebrahimkhani, Bahareh Akhbari:
Shannon meets Stackelberg on the cognitive interference channel part I: A deterministic view. Trans. Emerg. Telecommun. Technol. 34(5) (2023) - [j19]Hadi Aghaee, Bahareh Akhbari:
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions. ISC Int. J. Inf. Secur. 15(3) (2023) - [i9]Hadi Aghaee, Bahareh Akhbari:
Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions. CoRR abs/2301.02479 (2023) - [i8]Hadi Aghaee, Bahareh Akhbari:
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel. CoRR abs/2301.03375 (2023) - 2022
- [j18]Saleh Darzi, Bahareh Akhbari, Hassan Khodaiemehr:
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. Clust. Comput. 25(1): 263-278 (2022) - [j17]Noushin Khosravi Largani, Bahareh Akhbari:
Enhancing secrecy performance of energy harvesting NOMA systems using IoT user scheduling under untrusted users. IET Commun. 16(18): 2208-2218 (2022) - [j16]Hadi Aghaee, Bahareh Akhbari:
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel. ISC Int. J. Inf. Secur. 14(3): 71-80 (2022) - [j15]Hossein Ghavami, Bahareh Akhbari:
Secrecy performance analysis of IRS-assisted D2D communication underlaying cellular network. Phys. Commun. 55: 101924 (2022) - 2021
- [j14]Atena Ebrahimkhani, Bahareh Akhbari:
Bargaining solutions in heterogeneous networks: A reinforcement learning-based approach. IET Commun. 15(18): 2315-2329 (2021) - [j13]Mohsen Kojury-Naftchali, Alireza Fereidunian, Mehdi Savaghebi, Bahareh Akhbari:
Change Detection in Electricity Consumption Patterns Utilizing Adaptive Information Theoretic Algorithms. IEEE Syst. J. 15(2): 2369-2377 (2021) - 2020
- [c16]Hadi Aghaee, Bahareh Akhbari:
Private Classical Information over a Quantum Multiple Access Channel: One-Shot Secrecy Rate Region. IST 2020: 222-226
2010 – 2019
- 2019
- [j12]Bardiya Barari, Pedram Kheirkhah Sangdeh, Bahareh Akhbari:
Secure degrees of freedom of two-user X-channel with synergistic alternating channel state information at transmitters. IET Inf. Secur. 13(1): 54-60 (2019) - [c15]Hadi Aghaee, Bahareh Akhbari:
Classical-Quantum Multiple Access Wiretap Channel. ISCISC 2019: 99-103 - 2018
- [j11]Atena Ebrahim Khani, Bahareh Akhbari, Babak Seyfe:
Secrecy Sum-Rate Enhancement in the Interference Channel via Price-Based Power Splitting. IEEE Commun. Lett. 22(12): 2523-2526 (2018) - [j10]Sahar Shahbaz, Bahareh Akhbari, Reza Asvadi:
LDPC codes over Gaussian multiple access wiretap channel. IET Commun. 12(8): 962-969 (2018) - [i7]Sahar Shahbaz, Bahareh Akhbari, Reza Asvadi:
LDPC Codes over Gaussian Multiple Access Wiretap Channel. CoRR abs/1801.04420 (2018) - 2016
- [j9]Hassan Zivari-Fard, Bahareh Akhbari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
Multiple access channel with common message and secrecy constraint. IET Commun. 10(1): 98-110 (2016) - [j8]Hassan Zivari-Fard, Bahareh Akhbari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message. IEEE Trans. Inf. Forensics Secur. 11(6): 1239-1251 (2016) - [c14]Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, Mohammad Reza Aref:
Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard. IST 2016: 111-116 - 2015
- [j7]Karim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref:
Enhancing privacy of recent authentication schemes for low-cost RFID systems. ISC Int. J. Inf. Secur. 7(2): 135-149 (2015) - 2014
- [c13]Hassan Zivari-Fard, Bahareh Akhbari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
Compound Multiple Access Channel with confidential messages. ICC 2014: 1922-1927 - [c12]Karim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref:
Privacy analysis and improvements of two recent RFID authentication protocols. ISCISC 2014: 137-142 - [c11]Nasrin Afshar, Bahareh Akhbari, Mohammad Reza Aref:
Random coding bound for E-capacity region of the relay channel with confidential messages. IWCIT 2014: 1-6 - [i6]Hassan Zivari-Fard, Bahareh Akhbari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
Multiple Access Wire-tap Channel with Common Message. CoRR abs/1402.4799 (2014) - [i5]Hassan Zivari-Fard, Bahareh Akhbari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
Compound Multiple Access Channel with Confidential Messages. CoRR abs/1402.5869 (2014) - 2013
- [c10]Mohammad Nasiraee, Bahareh Akhbari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
On the reliable transmission of correlated sources over two-relay network. ITW 2013: 1-5 - 2012
- [j6]Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
Three-user cognitive interference channel: capacity region with strong interference. IET Commun. 6(13): 2099-2107 (2012) - [j5]Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
On the Capacity of Interference Channel With Causal and Noncausal Generalized Feedback at the Cognitive Transmitter. IEEE Trans. Inf. Theory 58(5): 2813-2837 (2012) - [i4]Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
On the Capacity of Interference Channel with Causal and Non-causal Generalized Feedback at the Cognitive Transmitter. CoRR abs/1202.0204 (2012) - [i3]Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
Three-User Cognitive Interference Channel: Capacity Region with Strong Interference. CoRR abs/1206.4226 (2012) - 2011
- [j4]Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
Capacity bounds for multiple access-cognitive interference channel. EURASIP J. Wirel. Commun. Netw. 2011: 152 (2011) - [j3]Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
Compress-and-Forward Strategy for Cognitive Interference Channel with Unlimited Look-Ahead. IEEE Commun. Lett. 15(10): 1068-1071 (2011) - [j2]Bahareh Akhbari, Reza Khosravi-Farsani, Mohammad Reza Aref:
Cooperative relay broadcast channels with partial causal channel state information. IET Commun. 5(6): 760-774 (2011) - 2010
- [j1]Bahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref:
Compress-and-forward strategy for relay channel with causal and non-causal channel state information. IET Commun. 4(10): 1174-1186 (2010) - [c9]Bahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref:
State-Dependent Relay Channel with Private Messages with partial causal and non-causal Channel State Information. ISIT 2010: 634-638 - [c8]Reza Khosravi-Farsani, Bahareh Akhbari, Mohammad Reza Aref:
The capacity region of a class of Relay-Broadcast Channels and relay channels with three parallel unmatched subchannels. ISITA 2010: 818-823 - [c7]Bahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref:
Achievable rate regions for interference channel with two relays. ISITA 2010: 1018-1023 - [c6]Reza Khosravi-Farsani, Bahareh Akhbari, Mohammad Reza Aref:
Achievable rate regions for Dirty Tape Channels and "joint writing on Dirty paper and Dirty Tape". ITW 2010: 1-5 - [c5]Mahtab Mirmohseni, Bahareh Akhbari, Mohammad Reza Aref:
Capacity regions for some classes of Causal Cognitive Interference Channels with delay. ITW 2010: 1-5 - [i2]Reza Khosravi-Farsani, Bahareh Akhbari, Mohammad Reza Aref:
Achievable Rate Regions for Dirty Tape Channels and "Joint Writing on Dirty Paper and Dirty Tape". CoRR abs/1004.2616 (2010) - [i1]Bahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref:
State-Dependent Relay Channel with Private Messages with Partial Causal and Non-Causal Channel State Information. CoRR abs/1006.2565 (2010)
2000 – 2009
- 2009
- [c4]Reza Khosravi-Farsani, Mahtab Mirmohseni, Bahareh Akhbari, Hamed Firouzi, Mohammad Reza Aref:
The capacity region of the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels. ISIT 2009: 189-193 - [c3]Milad Sefidgaran, Bahareh Akhbari, Yalda Mohsenzadeh, Mohammad Reza Aref:
Reliable source transmission over relay networks with Side Information. ISIT 2009: 699-703 - [c2]Bahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref:
Compress-and-forward strategy for the relay channel with non-causal State Information. ISIT 2009: 1169-1173 - [c1]Reza Khosravi-Farsani, Bahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref:
Cooperative relay-broadcast channels with causal Channel State Information. ISIT 2009: 1174-1178
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-04 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint