Skip navigation

Browsing by Author Thapar S.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 10 of 10
Issue DateTitleAuthor(s)
2020Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy PerspectiveThapar S.; Mishra D.; Saini R.
2022Ergodic Performance of Downlink Untrusted NOMA System with Imperfect SICHota P.K.; Thapar S.; Mishra D.; Saini R.; Dubey A.
2020Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization among Untrusted UsersThapar S.; Mishra D.; Saini R.
2022Optimal AI-Enabled Secured NOMA Among Untrusted UsersThapar S.; Prasad G.; Mishra D.; Saini R.
2019Secrecy fairness aware NOMA for untrusted usersThapar S.; Mishra D.; Saini R.
2021Secrecy Outage Probability Analysis for Downlink NOMA with Imperfect SIC at Untrusted UsersThapar S.; Amin I.; Mishra D.; Saini R.
2021Secrecy Outage Probability Analysis for Downlink Untrusted NOMA under Practical SIC ErrorThapar S.; Mishra D.; Ng D.W.K.; Saini R.
2023Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted DevicesThapar S.; Mishra D.; Saini R.
2022Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and OptimizationThapar S.; Mishra D.; Saini R.
2022User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMAThapar S.; Mishra D.; Saini R.; Ding Z.