default search action
Ravikant Saini
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Insha Amin, Deepak Mishra, Ravikant Saini, Sonia Aïssa:
Power Allocation and Decoding Order Selection for Secrecy Fairness in Downlink Cooperative NOMA With Untrusted Receivers Under Imperfect SIC. IEEE Trans. Inf. Forensics Secur. 19: 9406-9418 (2024) - [j12]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices. IEEE Trans. Ind. Informatics 20(1): 411-420 (2024) - [j11]Sapna Thapar, Deepak Mishra, Ravikant Saini, Zhiguo Ding:
Pair Outage Probability Minimization for NOMA Among Resource-Constrained IoT Users. IEEE Trans. Veh. Technol. 73(8): 11362-11377 (2024) - [c22]Kaneez Khatoon, Deepak Mishra, Ravikant Saini:
IRS Assisted Secure NOMA for Untrusted Users. ICASSP Workshops 2024: 356-360 - [c21]Prerna Devi, Deepak Mishra, Ravikant Saini:
QoS-Aware Optimal Power Control for Securing THz NOMA among Untrusted Heterogeneous Users. SPAWC 2024: 186-190 - 2023
- [c20]Insha Amin, Deepak Mishra, Ravikant Saini, Sonia Aïssa:
Power Control for Secrecy Fairness-Aware Regenerative Relaying in Untrusted NOMA. GLOBECOM 2023: 7255-7260 - [c19]Insha Amin, Deepak Mishra, Ravikant Saini, Sonia Aïssa:
Secrecy Rate Maximization in Relay-Assisted NOMA with Imperfect SIC. WCNC 2023: 1-6 - [i13]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices. CoRR abs/2308.08800 (2023) - [i12]Sapna Thapar, Deepak Mishra, Derrick Wing Kwan Ng, Ravikant Saini:
Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error. CoRR abs/2308.08804 (2023) - [i11]Sapna Thapar, Insha Amin, Deepak Mishra, Ravikant Saini:
Secrecy Outage Probability Analysis for Downlink NOMA with Imperfect SIC at Untrusted Users. CoRR abs/2308.08811 (2023) - [i10]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization. CoRR abs/2308.08813 (2023) - [i9]Sapna Thapar, Deepak Mishra, Ravikant Saini, Zhiguo Ding:
User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMA. CoRR abs/2308.08818 (2023) - 2022
- [j10]Pradosh Kumar Hota, Sapna Thapar, Deepak Mishra, Ravikant Saini, Ankit Dubey:
Ergodic Performance of Downlink Untrusted NOMA System With Imperfect SIC. IEEE Commun. Lett. 26(1): 23-26 (2022) - [j9]Insha Amin, Deepak Mishra, Ravikant Saini, Sonia Aïssa:
QoS-Aware Secrecy Rate Maximization in Untrusted NOMA With Trusted Relay. IEEE Commun. Lett. 26(1): 31-34 (2022) - [j8]Bharti Katiyar, Deepak Mishra, Sudhakar Modem, Ravikant Saini:
Optimal User Cooperation in IRS Assisted WPCN for Practical Non-Linear Phase-Shift Model. IEEE Commun. Lett. 26(11): 2720-2724 (2022) - [c18]Ravikant Saini, Deepak Mishra, Weisu Xiong, Jinhong Yuan:
IRS-Assisted Secure OFDMA With Untrusted Users. GLOBECOM (Workshops) 2022: 619-624 - [c17]Insha Amin, Deepak Mishra, Ravikant Saini, Sonia Aïssa:
Secrecy Rate Maximization in Relay-Assisted NOMA with Untrusted Users. PIMRC 2022: 1134-1138 - [c16]Pradosh Kumar Hota, Deepak Mishra, Ravikant Saini, Ankit Dubey:
Secure NOMA for Maximizing Ergodic Secrecy Fairness in the Presence of Untrusted Users. SPAWC 2022: 1-5 - [c15]Sapna Thapar, Deepak Mishra, Ravikant Saini, Zhiguo Ding:
User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMA. VTC Fall 2022: 1-5 - [c14]Sapna Thapar, Ganesh Prasad, Deepak Mishra, Ravikant Saini:
Optimal AI-Enabled Secured NOMA Among Untrusted Users. VTC Fall 2022: 1-5 - [c13]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization. WCNC 2022: 1993-1998 - 2021
- [j7]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Decoding Orders for Securing Untrusted NOMA. IEEE Netw. Lett. 3(1): 27-30 (2021) - [c12]Insha Amin, Deepak Mishra, Ravikant Saini, Virendra Singh:
Secrecy Rate Maximization at Near User in Untrusted NOMA with Trusted DF Relay. ANTS 2021: 1-6 - [c11]Ravikant Saini, Deepak Mishra, Venugopalachary Kotha:
Power Allocation and Relay Placement for Secrecy Outage Minimization over DF Relayed System. CCNC 2021: 1-4 - [c10]Sapna Thapar, Insha Amin, Deepak Mishra, Ravikant Saini:
Secrecy Outage Probability Analysis for Downlink NOMA with Imperfect SIC at Untrusted Users. EUSIPCO 2021: 1696-1700 - [c9]Sapna Thapar, Deepak Mishra, Derrick Wing Kwan Ng, Ravikant Saini:
Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error. GLOBECOM 2021: 1-6 - [i8]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Secrecy Fairness Aware NOMA for Untrusted Users. CoRR abs/2103.16463 (2021) - [i7]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Decoding Orders for Securing Untrusted NOMA. CoRR abs/2103.16478 (2021) - [i6]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective. CoRR abs/2103.16503 (2021) - [i5]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users. CoRR abs/2103.16814 (2021) - 2020
- [j6]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users. IEEE Trans. Veh. Technol. 69(11): 13259-13272 (2020) - [c8]Ravikant Saini, Deepak Mishra:
Friendly Jammer Localization for Secrecy Enhancement. NCC 2020: 1-6 - [c7]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective. WCNC 2020: 1-6
2010 – 2019
- 2019
- [j5]Ravikant Saini, Deepak Mishra, Swades De:
Subcarrier pairing as channel gain tailoring: Joint resource allocation for relay-assisted secure OFDMA with untrusted users. Phys. Commun. 32: 217-230 (2019) - [c6]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Secrecy Fairness Aware NOMA for Untrusted Users. GLOBECOM 2019: 1-6 - [c5]Kotha Venugopalachary, Deepak Mishra, Ravikant Saini, Vijaykumar Chakka:
Optimizing Secrecy Performance of Trusted RF Relay against External Eavesdropping. GLOBECOM 2019: 1-6 - [c4]Kotha Venugopalachary, Deepak Mishra, Ravikant Saini, Vijaykumar Chakka:
Secrecy-Aware Jointly Optimal Transmit Power Budget Sharing and Trusted DF Relay Placement. WCNC Workshops 2019: 1-6 - [i4]Ravikant Saini, Deepak Mishra, Swades De:
OFDMA-based DF Secure Cooperative Communication with Untrusted Users. CoRR abs/1901.03585 (2019) - [i3]Ravikant Saini, Abhishek Jindal, Swades De:
Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users. CoRR abs/1901.03614 (2019) - [i2]Ravikant Saini, Deepak Mishra, Swades De:
Subcarrier Pairing as Channel Gain Tailoring: Joint Resource Allocation for Relay-Assisted Secure OFDMA with Untrusted Users. CoRR abs/1901.03637 (2019) - [i1]Ravikant Saini, Deepak Mishra, Swades De:
Utility Regions for DF Relay in OFDMA-based Secure Communication with Untrusted Users. CoRR abs/1901.05177 (2019) - 2017
- [j4]Ravikant Saini, Deepak Mishra, Swades De:
Utility Regions for DF Relay in OFDMA-Based Secure Communication With Untrusted Users. IEEE Commun. Lett. 21(11): 2512-2515 (2017) - [c3]Ravikant Saini, Deepak Mishra, Swades De:
Novel Subcarrier Pairing Strategy for DF Relayed Secure OFDMA with Untrusted Users. GLOBECOM Workshops 2017: 1-6 - 2016
- [j3]Ravikant Saini, Deepak Mishra, Swades De:
OFDMA-Based DF Secure Cooperative Communication With Untrusted Users. IEEE Commun. Lett. 20(4): 716-719 (2016) - [j2]Ravikant Saini, Abhishek Jindal, Swades De:
Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users. IEEE Trans. Inf. Forensics Secur. 11(5): 1055-1070 (2016) - 2015
- [c2]Ravikant Saini, Abhishek Jindal, Swades De:
Jammer assisted sum rate and fairness improvement in secure OFDMA. ICC 2015: 7263-7268 - 2014
- [j1]Swades De, Ravikant Saini, Ashwani Sharma:
Source-Aware Adaptive Power Allocation in OFDM Systems for Rate Constrained Applications. IEEE Commun. Lett. 18(10): 1855-1858 (2014) - [c1]Ravikant Saini, Swades De:
Subcarrier based resource allocation. NCC 2014: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint