PHY/Cybersecurity

  1. Shakil Ahmed at. el. “Quantum-Enhanced Zero Trust Framework with Dynamic Anomaly Detection and Adaptive Microsegmentation in 7G Technology” in preparation for IEEE Transactions On Quantum Engineering
  2. S. Ahmed and B. Bash, “Average worst-case secrecy rate maximization via UAV and base station resource allocation,” in Proc. 57th Allerton Conference on Communication, Control, and Computing, Illinois, pp. 1176-1181, Sept. 2019.
  3. S. Arnab, S. Alam, T. Mahmud, S. Sabuj, and S. Ahmed. “Deep Convolutional Generative Adversarial Networks: Performance Analysis in Wireless Systems,” Discover Internet of Things, Springer (accepted), 2024.
  4. M. Chowdhury, and S. Ahmed, “A New Conditional Generative Adversarial Network for Massive MIMO Channel Estimation,” submitted to 2024 Arabian Journal for Science and Engineering (AJSE).
  5. S. Sabuj, S. Ahmed, and A. Khokhar. “Spectrum Scarcity in Vehicular Networks in 6G: Architecture, Challenges and Solutions,” in preparation for IEEE Vehicular Technology Magazine.
  6. S. Ahmed, M.Z. Chowdhury, S. Sabuj, Y. Jang, and I. Alam. “Energy-efficient UAV relaying robust resource allocation in uncertain adversarial networks,” IEEE Access, vol. 9, pp. 59920-59934, 2021.
  7. M. Chowdhury, A. Hossain, S. Ahmed, et al. “Radio resource management based on reused frequency allocation for dynamic channel borrowing scheme in wireless networks,” Wireless Networks (Springer), vol. 21, pp. 2593–2607, 2015.