default search action
Hamid Behroozi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Vahid Shahiri, Hamid Behroozi, Ali Kuhestani, Kai-Kit Wong:
Reconfigurable-Intelligent-Surface-Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments. IEEE Internet Things J. 11(9): 15808-15822 (2024) - [j45]Vahid Shahiri, Moslem Forouzesh, Hamid Behroozi, Ali Kuhestani, Kai-Kit Wong:
Deep Learning Aided Secure Transmission in Wirelessly Powered Untrusted Relaying in the Face of Hardware Impairments. IEEE Open J. Commun. Soc. 5: 2196-2210 (2024) - [j44]Mohammad Bokaei, Saeed Razavikia, Stefano Rini, Arash Amini, Hamid Behroozi:
Harmonic retrieval using weighted lifted-structure low-rank matrix completion. Signal Process. 216: 109253 (2024) - [j43]Mahdi Nouri, Mahrokh G. Shayesteh, Hamid Behroozi, Zhiguo Ding:
Digital/Hybrid Beamforming via KLMS Algorithm in Presence of Mutual Coupling With Experimental Evaluation for 5G and V2V Communications. IEEE Trans. Veh. Technol. 73(4): 5229-5242 (2024) - [j42]Hamidreza Hashempour, Hamed Bastami, Majid Moradikia, Seyed A. Zekavat, Hamid Behroozi, Gilberto Berardinelli, A. Lee Swindlehurst:
Secure SWIPT in the Multiuser STAR-RIS Aided MISO Rate Splitting Downlink. IEEE Trans. Veh. Technol. 73(9): 13466-13481 (2024) - [j41]Vahid Shahiri, Hamid Behroozi:
Physical Layer Secret Key Generation With the Aid of Spatially Correlated Active RIS. IEEE Wirel. Commun. Lett. 13(2): 535-539 (2024) - [i15]Mahshid Dehghani, Amirahmad Shafiee, Ali Shafiei, Neda Fallah, Farahmand Alizadeh, Mohammad Mehdi Gholinejad, Hamid Behroozi, Jafar Habibi, Ehsaneddin Asgari:
Emo3D: Metric and Benchmarking Dataset for 3D Facial Expression Generation from Emotion Description. CoRR abs/2410.02049 (2024) - 2023
- [j40]Mahdi Nouri, Alireza Jafarieh, Hamid Behroozi, Nazih Khaddaj Mallat, Amjad Iqbal, Md. Jalil Piran, Duehee Lee:
A Compact Filter and Dipole Antenna With Its Phased Array Filtenna and ADMM-BO Learning for Use-Case Analog/Hybrid Beamforming in 5G mmWave Communications. IEEE Access 11: 55990-56007 (2023) - [j39]Mahdi Nouri, Hamid Behroozi, Hamed Bastami, Majid Moradikia, Alireza Jafarieh, Ahmed Abdelhadi, Zhu Han:
Hybrid Precoding Based on Active Learning for mmWave Massive MIMO Communication Systems. IEEE Trans. Commun. 71(5): 3043-3058 (2023) - [j38]Mahdi Nouri, Hamid Behroozi, Alireza Jafarieh, Sajjad Abazari Aghdam, Md. Jalil Piran, Nazih Khaddaj Mallat:
A Learning-Based Dipole Yagi-Uda Antenna and Phased Array Antenna for mmWave Precoding and V2V Communication in 5G Systems. IEEE Trans. Veh. Technol. 72(3): 2789-2803 (2023) - [j37]Hamed Bastami, Hamid Behroozi, Majid Moradikia, Ahmed Abdelhadi, Derrick Wing Kwan Ng, Lajos Hanzo:
Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel. IEEE Trans. Veh. Technol. 72(7): 9267-9280 (2023) - [j36]Hassan Keshvari Khojasteh, Hoda Mohammadzade, Hamid Behroozi:
Temporal action localization using gated recurrent units. Vis. Comput. 39(7): 2823-2834 (2023) - [c46]Seyyed AmirHossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz:
Secure Deep-JSCC Against Multiple Eavesdroppers. GLOBECOM 2023: 3433-3438 - [i14]Seyyed AmirHossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz:
Secure Deep-JSCC Against Multiple Eavesdroppers. CoRR abs/2308.02892 (2023) - [i13]Mohammad Bokaei, Saeed Razavikia, Stefano Rini, Arash Amini, Hamid Behroozi:
Harmonic Retrieval Using Weighted Lifted-Structure Low-Rank Matrix Completion. CoRR abs/2311.05003 (2023) - 2022
- [j35]Hatef Otroshi-Shahreza, Arash Amini, Hamid Behroozi:
Feature-based no-reference video quality assessment using Extra Trees. IET Image Process. 16(6): 1531-1543 (2022) - [j34]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems With Randomly-Distributed Eavesdroppers. IEEE Trans. Commun. 70(2): 1125-1139 (2022) - [j33]Hamed Bastami, Majid Moradikia, Ahmed Abdelhadi, Hamid Behroozi, Bruno Clerckx, Lajos Hanzo:
Maximizing the Secrecy Energy Efficiency of the Cooperative Rate-Splitting Aided Downlink in Multi-Carrier UAV Networks. IEEE Trans. Veh. Technol. 71(11): 11803-11819 (2022) - [j32]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries. IEEE Wirel. Commun. Lett. 11(4): 856-860 (2022) - [c45]Alireza Jafarieh, Mahdi Nouri, Hamid Behroozi, Nazih Khaddaj Mallat:
A Design of a mmWave Compact Antenna with a Microstrip Line Balun Feed for 5G Communications. ICCSPA 2022: 1-4 - [c44]Nazih Khaddaj Mallat, Alireza Jafarieh, Mahdi Nouri, Hamid Behroozi:
A Machine Learning Based Design of mmWave Compact Array Antenna for 5G Communications. ICCSPA 2022: 1-4 - [c43]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
Wireless-Powered Cooperative Key Generation for e-Health: A Reservoir Learning Approach. VTC Spring 2022: 1-7 - [i12]Hamed Bastami, Hamid Behroozi, Majid Moradikia, Ahmed Abdelhadi, Derrick Wing Kwan Ng, Lajos Hanzo:
Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel. CoRR abs/2209.12591 (2022) - [i11]Hamed Bastami, Majid Moradikia, Hamid Behroozi, Lajos Hanzo:
Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection. CoRR abs/2210.03926 (2022) - [i10]Hamidreza Hashempour, Hamed Bastami, Majid Moradikia, Seyed A. Zekavat, Hamid Behroozi, A. Lee Swindlehurst:
Secure SWIPT in STAR-RIS Aided Downlink MISO Rate-Splitting Multiple Access Networks. CoRR abs/2211.09081 (2022) - 2021
- [j31]Hamed Bastami, Majid Moradikia, Hamid Behroozi, Rodrigo C. de Lamare, Ahmed Abdelhadi, Zhiguo Ding:
Secrecy rate maximization for hardware impaired untrusted relaying network with deep learning. Phys. Commun. 49: 101476 (2021) - [j30]Mahdi Nouri, Hamid Behroozi, Nazih Khaddaj Mallat, Sajjad Abazari Aghdam:
A Wideband 5G Cyclostationary Spectrum Sensing Method by Kernel Least Mean Square Algorithm for Cognitive Radio Networks. IEEE Trans. Circuits Syst. II Express Briefs 68(7): 2700-2704 (2021) - [j29]Hamed Bastami, Mehdi Letafati, Majid Moradikia, Ahmed Abdelhadi, Hamid Behroozi, Lajos Hanzo:
On the Physical Layer Security of the Cooperative Rate-Splitting-Aided Downlink in UAV Networks. IEEE Trans. Inf. Forensics Secur. 16: 5018-5033 (2021) - [j28]Ruchika Verma, Neeraj Kumar, Abhijeet Patil, Nikhil Cherian Kurian, Swapnil Rane, Simon Graham, Quoc Dang Vu, Mieke Zwager, Shan-E-Ahmed Raza, Nasir M. Rajpoot, Xiyi Wu, Huai Chen, Yijie Huang, Lisheng Wang, Hyun Jung, G. Thomas Brown, Yanling Liu, Shuolin Liu, Seyed Alireza Fatemi Jahromi, Ali Asghar Khani, Ehsan Montahaei, Mahdieh Soleymani Baghshah, Hamid Behroozi, Pavel Semkin, Alexandr Rassadin, Prasad Dutande, Romil Lodaya, Ujjwal Baid, Bhakti Baheti, Sanjay N. Talbar, Amirreza Mahbod, Rupert Ecker, Isabella Ellinger, Zhipeng Luo, Bin Dong, Zhengyu Xu, Yuehan Yao, Shuai Lv, Ming Feng, Kele Xu, Hasib Zunair, Abdessamad Ben Hamza, Steven M. Smiley, Tang-Kai Yin, Qi-Rui Fang, Shikhar Srivastava, Dwarikanath Mahapatra, Lubomira Trnavska, Hanyun Zhang, Priya Lakshmi Narayanan, Justin Law, Yinyin Yuan, Abhiroop Tejomay, Aditya Mitkari, Dinesh Koka, Vikas Ramachandra, Lata Kini, Amit Sethi:
MoNuSAC2020: A Multi-Organ Nuclei Segmentation and Classification Challenge. IEEE Trans. Medical Imaging 40(12): 3413-3423 (2021) - [j27]Milad Tatar Mamaghani, Ali Kuhestani, Hamid Behroozi:
Can a multi-hop link relying on untrusted amplify-and-forward relays render security? Wirel. Networks 27(1): 795-807 (2021) - [c42]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
Deep Learning for Hardware-Impaired Wireless Secret Key Generation with Man-in-the-Middle Attacks. GLOBECOM 2021: 1-6 - [c41]Hamed Bastami, Majid Moradikia, Mehdi Letafati, Ahmed Abdelhadi, Hamid Behroozi:
Outage-Constrained Robust and Secure Design for Downlink Rate-Splitting UAV Networks. ICC Workshops 2021: 1-7 - [c40]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
Content-Based Medical Image Transmission Against Randomly-Distributed Passive Eavesdroppers. ICC Workshops 2021: 1-7 - [i9]Mohammad Akyash, Hoda Mohammadzade, Hamid Behroozi:
DTW-Merge: A Novel Data Augmentation Technique for Time Series Classification. CoRR abs/2103.01119 (2021) - [i8]Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck:
On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems with Randomly-Distributed Eavesdroppers - Extended Version. CoRR abs/2104.09326 (2021) - [i7]Hassan Keshvari Khojasteh, Hoda Mohammadzade, Hamid Behroozi:
Temporal Action Localization Using Gated Recurrent Units. CoRR abs/2108.03375 (2021) - 2020
- [j26]Mohammad Mahdi Johari, Hamid Behroozi:
Context-aware colorization of gray-scale images utilizing a cycle-consistent generative adversarial network architecture. Neurocomputing 407: 94-104 (2020) - [j25]Ehsan Tohidi, Alireza Hariri, Hamid Behroozi, Mohammad Mahdi Nayebi, Geert Leus, Athina P. Petropulu:
Compressed-Domain Detection and Estimation for Colocated MIMO Radar. IEEE Trans. Aerosp. Electron. Syst. 56(6): 4504-4518 (2020) - [j24]Mehdi Letafati, Ali Kuhestani, Hamid Behroozi:
Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things. IEEE Trans. Inf. Forensics Secur. 15: 2856-2868 (2020) - [j23]Mehdi Letafati, Ali Kuhestani, Hamid Behroozi, Derrick Wing Kwan Ng:
Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay. IEEE Trans. Wirel. Commun. 19(10): 6771-6785 (2020) - [c39]Mohammad Mahdi Johari, Hamid Behroozi:
Gray-Scale Image Colorization Using Cycle-Consistent Generative Adversarial Networks with Residual Structure Enhancer. ICASSP 2020: 2223-2227 - [c38]Mehdi Letafati, Ali Kuhestani, Derrick Wing Kwan Ng, Hamid Behroozi:
A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay. ICC Workshops 2020: 1-7 - [c37]Mahdi Cherakhloo, Hatef Otroshi-Shahreza, Mohammad Soltanian, Sina Ranjkeshzadeh, Hamid Azadegan, Alireza Shirkhodaee, Arash Amini, Hamid Behroozi:
Measuring Image Blooming using Blurriness Metrics. IST 2020: 128-131 - [i6]Ehsan Sadeghi, Hamid Behroozi, Stefano Rini:
Fairness-Oriented User Association in HetNets Using Bargaining Game Theory. CoRR abs/2011.04801 (2020)
2010 – 2019
- 2019
- [j22]Majid Moradikia, Hamed Bastami, Ali Kuhestani, Hamid Behroozi, Lajos Hanzo:
Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments. IEEE Access 7: 116942-116964 (2019) - [j21]Ehsan Tohidi, Mario Coutino, Sundeep Prabhakar Chepuri, Hamid Behroozi, Mohammad Mahdi Nayebi, Geert Leus:
Sparse Antenna and Pulse Placement for Colocated MIMO Radar. IEEE Trans. Signal Process. 67(3): 579-593 (2019) - [i5]Ali Kuhestani, Milad Tatar Mamaghani, Hamid Behroozi:
A new secure multi-hop untrusted relaying scheme. CoRR abs/1905.09384 (2019) - 2018
- [j20]Ehsan Tohidi, Mojtaba Radmard, Mohammad Nazari Majd, Hamid Behroozi, Mohammad Mahdi Nayebi:
Compressive sensing MTI processing in distributed MIMO radars. IET Signal Process. 12(3): 327-334 (2018) - [c36]Hatef Otroshi-Shahreza, Arash Amini, Hamid Behroozi:
No-Reference Image Quality Assessment using Transfer Learning. IST 2018: 637-640 - 2017
- [j19]Mehdi Setayesh, Hamid Behroozi, Babak H. Khalaj:
A Distortion Outer Bound for Communicating Correlated Gaussian Sources Over a Gaussian MAC. IEEE Commun. Lett. 21(7): 1457-1460 (2017) - [j18]Niloofar Okati, Mohammad Reza Mosavi, Hamid Behroozi:
A Novel Genetic-Based Resource Allocation and Cooperative Node Selection Technique for Physical Layer Security Designs. Wirel. Pers. Commun. 95(4): 4733-4746 (2017) - [c35]Ehsan Tohidi, Hamid Behroozi, Geert Leus:
Antenna and pulse selection for colocated MIMO radar. ACSSC 2017: 563-567 - 2016
- [j17]Shima Haddadi, Ashkan Oliaiee, Hamid Behroozi, Babak Hossein Khalaj:
On the power allocation strategies in coordinated multi-cell networks using Stackelberg game. EURASIP J. Wirel. Commun. Netw. 2016: 91 (2016) - [j16]Shahab Ghasemi-Goojani, Hamid Behroozi:
On Reconstructing Linear Combinations of Correlated Gaussian Sources Over a MAC. IEEE Commun. Lett. 20(12): 2450-2453 (2016) - [j15]Shahab Ghasemi-Goojani, Saeed Karimi-Bidhendi, Hamid Behroozi:
On the Capacity Region of Asymmetric Gaussian Two-Way Line Channel. IEEE Trans. Commun. 64(9): 3669-3682 (2016) - [j14]Shahab Ghasemi-Goojani, Shokoufeh Mardani, Hamid Behroozi:
A Lattice-Based Compress-and-Forward Strategy for Gaussian Two-Way Relay Channel With Direct Links. IEEE Wirel. Commun. Lett. 5(5): 500-503 (2016) - [c34]Mehdi Setayesh, Hamid Behroozi, Babak H. Khalaj:
On distributed transmission of remote correlated Gaussian sources over an orthogonal Gaussian multiple-access channel. IST 2016: 245-250 - [c33]Niloofar Okati, Mohammad Reza Mosavi, Hamid Behroozi:
A genetic approach in relay-jammer selection and power allocation for physical layer security. IST 2016: 374-379 - 2015
- [j13]Shahab Ghasemi-Goojani, Hamid Behroozi:
Lattice-coded cooperation protocol for the half-duplex Gaussian two-way relay channel. EURASIP J. Wirel. Commun. Netw. 2015: 252 (2015) - [j12]Mahdi Baianifar, Hamid Behroozi:
Achievable rate regions for many-to-one Gaussian interference channel with a fusion centre. IET Commun. 9(6): 880-887 (2015) - 2014
- [j11]Shahab Ghasemi-Goojani, Hamid Behroozi:
On the capacity of state-dependent Gaussian cognitive interference channel. EURASIP J. Wirel. Commun. Netw. 2014: 196 (2014) - [j10]Shahab Ghasemi-Goojani, Hamid Behroozi:
A New Achievable Rate Region for the Gaussian Two-Way Relay Channel via Hybrid Broadcast Protocol. IEEE Commun. Lett. 18(11): 1883-1886 (2014) - [j9]Fariba Abbasi, Ali Aghagolzadeh, Hamid Behroozi:
Sending a Laplacian Source Using Hybrid Digital-Analog Codes. IEEE Trans. Commun. 62(7): 2544-2557 (2014) - [c32]Shahab Ghasemi-Goojani, Hamid Behroozi:
State-dependent Gaussian Z-interference channel: New results. ISITA 2014: 468-472 - [c31]Shahab Ghasemi-Goojani, Hamid Behroozi:
On the Ice-Wine problem: Recovering linear combination of codewords over the Gaussian Multiple Access Channel. ITW 2014: 132-136 - [c30]Shahab Ghasemi-Goojani, Hamid Behroozi:
Nested lattice codes for the state-dependent Gaussian interference channel with a common message. IWCIT 2014: 1-6 - [i4]Shahab Ghasemi-Goojani, Hamid Behroozi:
On the Ice-Wine Problem: Recovering Linear Combination of Codewords over the Gaussian Multiple Access Channel. CoRR abs/1408.4100 (2014) - 2013
- [c29]Sajjad Eghbalian-Arani, Hamid Behroozi:
Polar Codes for a Quadratic-Gaussian Wyner-Ziv Problem. ISWCS 2013: 1-5 - [c28]Shahab Ghasemi-Goojani, Hamid Behroozi:
On the Transmission Strategies for the Two-User State-Dependent Gaussian Interference Channel. ISWCS 2013: 1-5 - [c27]Shahab Ghasemi-Goojani, Hamid Behroozi:
Interference neutralization using lattice codes. ITW 2013: 1-5 - [c26]Sajjad Eghbalian-Arani, Hamid Behroozi:
On the performance of polar codes for lossy compression of Gaussian sources. IWCIT 2013: 1-5 - [c25]Farzin Haddadpour, Ehsan Gholami, Seyed Hamed Rastegar, Hamid Behroozi:
Finite-SNR diversity-multiplexing tradeoff in multi-relay channels. IWCIT 2013: 1-6 - [i3]Shahab Ghasemi-Goojani, Hamid Behroozi:
On the Achievable Rate-Regions for State-Dependent Gaussian Interference Channel. CoRR abs/1301.5535 (2013) - [i2]Shahab Ghasemi-Goojani, Hamid Behroozi:
Nested Lattice Codes for Gaussian Two-Way Relay Channels. CoRR abs/1301.6291 (2013) - 2012
- [j8]Morteza Varasteh, Hamid Behroozi:
Optimal HDA Schemes for Transmission of a Gaussian Source Over a Gaussian Channel With Bandwidth Compression in the Presence of an Interference. IEEE Trans. Signal Process. 60(4): 2081-2085 (2012) - [c24]Shahab Ghasemi-Goojani, Hamid Behroozi:
Sending linear functions of correlated gaussian sources over a MAC in the presence of known interference at the transmitter. CISS 2012: 1-6 - [c23]Shahab Ghasemi-Goojani, Hamid Behroozi:
Sending a Gaussian source over an AWGN channel in the presence of an unknown interference. CISS 2012: 1-5 - [c22]Morteza Varasteh, Hamid Behroozi:
Layered hybrid digital-analog coding with correlated interference. ICC 2012: 2565-2569 - [c21]Shima Haddadi, Hamid Behroozi, Babak Hossein Khalaj:
Power allocation in coordinated multi-cell networks using Stackelberg game. IST 2012: 289-294 - [c20]Fariba Abbasi, Ali Aghagolzadeh, Hamid Behroozi:
On the transmission of a Laplacian source over an AWLN channel with bandwidth compression. IST 2012: 669-673 - [c19]Shahab Ghasemi-Goojani, Hamid Behroozi:
On the sum-capacity and lattice-based transmission strategies for state-dependent Gaussian interference channel. PIMRC 2012: 1944-1948 - 2011
- [j7]Hamid Behroozi, Fady Alajaji, Tamás Linder:
On the Performance of Hybrid Digital-Analog Coding for Broadcasting Correlated Gaussian Sources. IEEE Trans. Commun. 59(12): 3335-3342 (2011) - [c18]Morteza Varasteh, Hamid Behroozi:
Optimal HDA codes for sending a Gaussian source over a Gaussian channel with bandwidth compression in the presence of an interference. ITW 2011: 325-329 - 2010
- [j6]Hamid Behroozi, Fady Alajaji, Tamás Linder:
On the optimal performance in asymmetric gaussian wireless sensor networks with fading. IEEE Trans. Signal Process. 58(4): 2436-2441 (2010)
2000 – 2009
- 2009
- [j5]Hamid Behroozi, M. Reza Soleymani:
On the optimal power-distortion tradeoff in asymmetric gaussian sensor network. IEEE Trans. Commun. 57(6): 1612-1617 (2009) - [j4]Hamid Behroozi, M. Reza Soleymani:
Optimal rate allocation in successively structured Gaussian CEO problem. IEEE Trans. Wirel. Commun. 8(2): 627-632 (2009) - [j3]Hamid Behroozi, M. Reza Soleymani:
Joint optimization of power scheduling and rate-distortion performance in one-helper problem. Wirel. Commun. Mob. Comput. 9(10): 1369-1378 (2009) - [j2]Hamid Behroozi, M. Reza Soleymani:
Successively Structured Gaussian Two-terminal Source Coding. Wirel. Pers. Commun. 48(4): 485-510 (2009) - [c17]Hamid Behroozi, Fady Alajaji, Tamás Linder:
Hybrid digital-analog joint source-channel coding for broadcasting correlated Gaussian sources. ISIT 2009: 2785-2789 - [c16]Javad Haghighat, Hamid Behroozi, David V. Plant:
Extended-Serial Decoding for Turbo-Coded Data Gathering Sensor Networks. VTC Spring 2009 - 2008
- [c15]Hamid Behroozi, Fady Alajaji, Tamás Linder:
On the optimal power-distortion region for asymmetric Gaussian sensor networks with fading. ISIT 2008: 1538-1542 - [c14]Saeed Akhavan-Astaneh, Saeed Gazor, Hamid Behroozi:
On the capacity of Pairwise Collaborative Networks. PIMRC 2008: 1-5 - [c13]Javad Haghighat, Hamid Behroozi, David V. Plant:
Joint decoding and data fusion in wireless sensor networks using turbo codes. PIMRC 2008: 1-5 - [c12]Hamid Behroozi, M. Reza Soleymani:
Joint Power-Distortion Optimization in a One-Helper Problem. VTC Fall 2008: 1-5 - [i1]Saeed Akhavan-Astaneh, Saeed Gazor, Hamid Behroozi:
On the Capacity of Pairwise Collaborative Networks. CoRR abs/0807.0868 (2008) - 2007
- [j1]Hamid Behroozi, M. Reza Soleymani:
Distortion sum-rate performance of successive coding strategy in quadratic gaussian CEO problem. IEEE Trans. Wirel. Commun. 6(12): 4361-4365 (2007) - [c11]Hamid Behroozi, M. Reza Soleymani:
Sending Correlated Gaussian Sources over a Gaussian MAC: To Code, or not to Code. ICC 2007: 2641-2647 - 2006
- [c10]Hamid Behroozi, M. Reza Soleymani:
Side Information Aware Coding Strategy in the Quadratic Gaussian CEO Problem. DCC 2006: 439 - [c9]Hamid Behroozi, M. Reza Soleymani:
Successively Structured Gaussian CEO Problem. GLOBECOM 2006 - [c8]Hamid Behroozi, M. Reza Soleymani:
Power-Distortion Performance of Successive Coding Strategy in Gaussian Ceo Problem. ICASSP (4) 2006: 277-280 - [c7]Hamid Behroozi, M. Reza Soleymani:
Successive Coding Strategy in the m-helper Problem. ISIT 2006: 336-340 - [c6]Hamid Behroozi, M. Reza Soleymani:
Cooperative Source Coding for the Two-Terminal Gaussian CEO Problem. VTC Fall 2006: 1-5 - [c5]Hamid Behroozi, M. Reza Soleymani:
Source-Channel Communication in One-Helper Problem. VTC Fall 2006: 1-5 - 2005
- [c4]Hamid Behroozi, M. Reza Soleymani:
Performance of the successive coding strategy in the CEO problem. GLOBECOM 2005: 6 - [c3]Hamid Behroozi, M. Reza Soleymani:
Distortion sum-rate performance of successive coding strategy in Gaussian wireless sensor networks. MASS 2005 - 2003
- [c2]Hamid Behroozi, Javad Haghighat, Masoumeh Nasiri-Kenari, Seyed Hamaidreza Jamali:
Performance evaluation of LDPC coded MC-FH-CDMA systems over fading channels. PIMRC 2003: 1574-1578 - 2002
- [c1]Javad Haghighat, Seyed Hamaidreza Jamali, Hamid Behroozi, Masoumeh Nasiri-Kenari:
High-performance LDPC codes for CDMA applications. MWCN 2002: 105-109
Coauthor Index
aka: Babak H. Khalaj
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint