default search action
Jagadeesh Harshan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Manish Bansal, Pramsu Shrivastava, Jagadeesh Harshan:
A Prototype on the Feasibility of Learning Spatial Provenance in XBee and LoRa Networks. COMSNETS 2024: 264-266 - [c29]Varun Laxman Muttepawar, Arjun Mehra, Zubair Shaban, Ranjitha Prasad, Jagadeesh Harshan:
Federated Learning for Wireless Applications: A Prototype. COMSNETS 2024: 300-302 - [c28]Manish Bansal, Pramsu Shrivastava, Jagadeesh Harshan:
On Learning Spatial Provenance in Privacy-Constrained Wireless Networks. WCNC 2024: 1-6 - [i32]Manish Bansal, Pramsu Shrivastava, Jagadeesh Harshan:
A Prototype on the Feasibility of Learning Spatial Provenance in XBee and LoRa Networks. CoRR abs/2401.06638 (2024) - [i31]Manish Bansal, Pramsu Shrivastava, Jagadeesh Harshan:
On Learning Spatial Provenance in Privacy-Constrained Wireless Networks. CoRR abs/2402.03702 (2024) - 2023
- [j22]Vivek Chaudhary, Harshan Jagadeesh:
Low-Latency Communication Using Delay-Aware Relays Against Reactive Adversaries. IEEE Trans. Commun. 71(6): 3481-3496 (2023) - [j21]Jaya Goel, Jagadeesh Harshan:
One-Hop Listening Based ARQs for Low-Latency Communication in Multihop Networks. IEEE Trans. Wirel. Commun. 22(2): 1044-1059 (2023) - [i30]Vivek Chaudhary, Jagadeesh Harshan:
Low-Latency Communication using Delay-Aware Relays Against Reactive Adversaries. CoRR abs/2302.03335 (2023) - [i29]Varun Laxman Muttepawar, Arjun Mehra, Zubair Shaban, Ranjitha Prasad, Harshan Jagadeesh:
Federated Learning for Wireless Applications: A Prototype. CoRR abs/2312.08577 (2023) - 2022
- [j20]Suraj Sajeev, Manish Bansal, Sriraam S. V, Harshan Jagadeesh, Huzur Saran, Yih-Chun Hu:
Secure and ultra-reliable provenance recovery in sparse networks: Strategies and performance bounds. Ad Hoc Networks 131: 102860 (2022) - [j19]Rusni Kima Mangang, Harshan Jagadeesh:
Do not forget the past: A buffer-aided framework for relay based key generation. J. Commun. Networks 24(1): 1-16 (2022) - [j18]Vivek Chaudhary, Harshan Jagadeesh:
Constellation Design for Non-Coherent Fast-Forward Relays to Mitigate Full-Duplex Jamming Attacks. IEEE Trans. Commun. 70(7): 4755-4770 (2022) - [j17]Harshan Jagadeesh, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, Yih-Chun Hu:
Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks. IEEE Trans. Dependable Secur. Comput. 19(2): 1194-1211 (2022) - [c27]Vivek Chaudhary, Jagadeesh Harshan:
Whisper when under Attack: Delay Tolerant Fast-Forward Relays against Full-Duplex Jamming. COMSNETS 2022: 163-171 - [c26]Neha Goel, Vivek Chaudhary, Jagadeesh Harshan:
Secret-Key Based Non-Coherent Signalling to Mitigate Reactive Injection Attacks. SPCOM 2022: 1-5 - [c25]Jaya Goel, Jagadeesh Harshan:
Optimization of ARQ Distribution for HARQ Strategies in Delay-Bounded Networks. WiOpt 2022: 145-152 - [i28]Jaya Goel, Jagadeesh Harshan:
Optimization of ARQ Distribution for HARQ Strategies in Delay-Bounded Networks. CoRR abs/2203.08381 (2022) - [i27]Suraj Sajeev, Manish Bansal, Sriraam S. V, Jagadeesh Harshan, Huzur Saran, Yih-Chun Hu:
Secure and Ultra-Reliable Provenance Recovery in Sparse Networks: Strategies and Performance Bounds. CoRR abs/2204.00159 (2022) - [i26]Vivek Chaudhary, Jagadeesh Harshan:
Constellation Design for Non-Coherent Fast-Forward Relays to Mitigate Full-Duplex Jamming Attacks. CoRR abs/2205.13198 (2022) - [i25]Jaya Goel, Jagadeesh Harshan:
One-Hop Listening Based ARQs for Low-Latency Communication in Multi-Hop Networks. CoRR abs/2208.03986 (2022) - [i24]Jaya Goel, Jagadeesh Harshan:
Hybrid-ARQ Based Relaying Strategies for Enhancing Reliability in Delay-Bounded Networks. CoRR abs/2208.04018 (2022) - 2021
- [j16]Murali Krishnan K. H., Jagadeesh Harshan:
On the Existence of XOR-Based Codes for Private Information Retrieval with Private Side Information. Entropy 23(10): 1287 (2021) - [j15]Vivek Chaudhary, Harshan Jagadeesh:
Fast-Forward Mitigation Schemes for Cognitive Adversary. IEEE Trans. Cogn. Commun. Netw. 7(4): 1304-1319 (2021) - [j14]Harshan Jagadeesh, Rohit Joshi, Manish Rao:
Group Secret-Key Generation Using Algebraic Rings in Wireless Networks. IEEE Trans. Veh. Technol. 70(2): 1538-1553 (2021) - [j13]Jaya Goel, Harshan Jagadeesh:
Listen to Others' Failures: Cooperative ARQ Schemes for Low-Latency Communication Over Multi-Hop Networks. IEEE Trans. Wirel. Commun. 20(9): 6049-6063 (2021) - [c24]Vivek Chaudhary, Jagadeesh Harshan:
Non-Coherent Fast-Forward Relays for Full-Duplex Jamming Attack. GLOBECOM 2021: 1-6 - [c23]Jaya Goel, Jagadeesh Harshan:
Minimal Overhead ARQ Sharing Strategies for URLLC in Multi-Hop Networks. VTC Spring 2021: 1-7 - [i23]Jaya Goel, Jagadeesh Harshan:
Minimal Overhead ARQ Sharing Strategies for URLLC in Multi-Hop Networks. CoRR abs/2103.04873 (2021) - [i22]Vivek Chaudhary, Harshan Jagadeesh:
Non-Coherent Fast-Forward Relays for Full-Duplex Jamming Attack. CoRR abs/2104.13583 (2021) - [i21]Murali Krishnan K. H., Jagadeesh Harshan:
XOR-Based Codes for Private Information Retrieval with Private Side Information. CoRR abs/2105.05788 (2021) - 2020
- [c22]S. V. Sriraam, Suraj Sajeev, Rohit Joshi, Amogh Vithalkar, Manish Bansal, Harshan Jagadeesh:
Implementation of 5G Authentication and Key Agreement Protocol on Xbee Networks. COMSNETS 2020: 696-698 - [c21]Vivek Chaudhary, Jagadeesh Harshan:
Fast-Forward Relaying Scheme to Mitigate Jamming Attacks by Full-Duplex Radios. PIMRC 2020: 1-7 - [c20]Jagadeesh Harshan, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, Yih-Chun Hu:
Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks. WCNC 2020: 1-7 - [c19]Jaya Goel, Jagadeesh Harshan:
On the Optimal ARQ Distribution for Low-Latency Communication over Line-of-Sight Dominated Multi-Hop Networks. WiOpt 2020: 214-221 - [i20]Vivek Chaudhary, Jagadeesh Harshan:
Fast-Forward Relaying Scheme to Mitigate Jamming Attacks by Full-Duplex Radios. CoRR abs/2004.08898 (2020)
2010 – 2019
- 2019
- [j12]Harshan Jagadeesh, Yih-Chun Hu:
Convolution Attack on Frequency Hopping by Full-Duplex Radios. IEEE Trans. Veh. Technol. 68(6): 5642-5656 (2019) - [i19]Jagadeesh Harshan, Yih-Chun Hu:
Convolution Attack on Frequency-Hopping by Full-Duplex Radios. CoRR abs/1903.11261 (2019) - 2018
- [c18]Jagadeesh Harshan, Yih-Chun Hu:
Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum. WCNC 2018: 1-6 - [i18]Jagadeesh Harshan, Yih-Chun Hu:
Cognitive Radio from Hell: Flipping Attack on Direct-Sequence Spread Spectrum. CoRR abs/1804.00907 (2018) - 2017
- [j11]Harshan Jagadeesh:
Generalized Pyramid Codes for Versioned Data in Distributed Storage Networks. IEEE Commun. Lett. 21(9): 1921-1924 (2017) - [c17]Jagadeesh Harshan, Sang-Yoon Chang, Seungmin Kang, Yih-Chun Hu:
Securing balise-based train control systems using cryptographic random fountains. CNS 2017: 405-410 - [c16]Jagadeesh Harshan, Sang-Yoon Chang, Yih-Chun Hu:
Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks. WCNC 2017: 1-6 - [c15]Jagadeesh Harshan, Amin Sakzad, Emanuele Viterbo:
Integer-Forcing Linear Receivers: A Design Criterion for Full-Diversity STBCs. WCNC 2017: 1-6 - [i17]Jagadeesh Harshan, Amin Sakzad, Emanuele Viterbo:
Integer-Forcing Linear Receivers: A Design Criterion for Full-Diversity STBCs. CoRR abs/1701.03566 (2017) - [i16]Jagadeesh Harshan, Sang-Yoon Chang, Yih-Chun Hu:
Insider-Attacks on Physical-Layer Group Secret-Key Generation in Wireless Networks. CoRR abs/1701.03568 (2017) - 2014
- [c14]Jagadeesh Harshan, Emanuele Viterbo:
Constellation constrained capacity of additive Gaussian mixture noise channels. ISITA 2014: 110-114 - 2013
- [j10]Jagadeesh Harshan, Emanuele Viterbo, Jean-Claude Belfiore:
Practical Encoders and Decoders for Euclidean Codes from Barnes-Wall Lattices. IEEE Trans. Commun. 61(11): 4417-4427 (2013) - [j9]Jagadeesh Harshan, B. Sundar Rajan:
A Novel Power Allocation Scheme for Two-User GMAC with Finite Input Constellations. IEEE Trans. Wirel. Commun. 12(2): 818-827 (2013) - [j8]Amin Sakzad, Jagadeesh Harshan, Emanuele Viterbo:
Integer-Forcing MIMO Linear Receivers Based on Lattice Reduction. IEEE Trans. Wirel. Commun. 12(10): 4905-4915 (2013) - [j7]Jagadeesh Harshan, Emanuele Viterbo:
Integer Space-Time Block Codes for Practical MIMO Systems. IEEE Wirel. Commun. Lett. 2(4): 455-458 (2013) - [c13]Amin Sakzad, Jagadeesh Harshan, Emanuele Viterbo:
On complex LLL algorithm for integer forcing linear receivers. AusCTW 2013: 13-17 - [c12]Jagadeesh Harshan, Emanuele Viterbo:
Full-rate integer space-time block codes for 2×2 MIMO channels. ICC 2013: 3187-3191 - [i15]Amin Sakzad, Jagadeesh Harshan, Emanuele Viterbo:
On Complex LLL Algorithm for Integer Forcing Linear Receivers. CoRR abs/1301.1415 (2013) - [i14]Jagadeesh Harshan, Emanuele Viterbo:
Integer Space-Time Block Codes for Practical MIMO Systems. CoRR abs/1303.3665 (2013) - 2012
- [c11]Jagadeesh Harshan, Emanuele Viterbo:
On the robustness of algebraic STBCs to coefficient quantization. AusCTW 2012: 55-60 - [c10]Jagadeesh Harshan, Emanuele Viterbo, Jean-Claude Belfiore:
Construction of Barnes-Wall lattices from linear codes over rings. ISIT 2012: 3110-3114 - [i13]Jagadeesh Harshan, Emanuele Viterbo, Jean-Claude Belfiore:
Practical Encoders and Decoders for Euclidean Codes from Barnes-Wall Lattices. CoRR abs/1203.3282 (2012) - [i12]Amin Sakzad, Jagadeesh Harshan, Emanuele Viterbo:
Integer-Forcing Linear Receivers Based on Lattice Reduction Algorithms. CoRR abs/1209.6412 (2012) - 2011
- [j6]Jagadeesh Harshan, B. Sundar Rajan:
On Two-User Gaussian Multiple Access Channels With Finite Input Constellations. IEEE Trans. Inf. Theory 57(3): 1299-1327 (2011) - [j5]Jagadeesh Harshan, B. Sundar Rajan, Are Hjørungnes:
Training-Symbol Embedded, High-Rate, Single-Symbol ML-Decodable, Distributed STBCs for Relay Networks. IEEE Trans. Inf. Theory 57(9): 6157-6169 (2011) - [c9]Jagadeesh Harshan, B. Sundar Rajan:
A constellation power allocation scheme for two-user Gaussian MAC. PIMRC 2011: 2050-2054 - [i11]Jagadeesh Harshan, B. Sundar Rajan:
A Constellation Power Allocation Scheme for Two-User Gaussian MAC. CoRR abs/1104.5170 (2011) - 2010
- [j4]Jagadeesh Harshan, B. Sundar Rajan:
Distributed Space-Time Block Codes for Two-Hop Wireless Relay Networks (Invited Paper). J. Commun. 5(4): 282-296 (2010) - [c8]Jagadeesh Harshan, B. Sundar Rajan, Are Hjørungnes:
Training-Embedded, Single-Symbol ML-Decodable, Distributed STBCs for Relay Networks. ICC 2010: 1-5 - [c7]Jagadeesh Harshan, B. Sundar Rajan, Are Hjørungnes:
Training-symbol embedded, high-rate complex orthogonal designs for relay networks. ISIT 2010: 2233-2237 - [i10]Jagadeesh Harshan, B. Sundar Rajan:
Orthogonal vs Non-Orthogonal Multiple Access with Finite Input Alphabet and Finite Bandwidth. CoRR abs/1001.0357 (2010)
2000 – 2009
- 2009
- [j3]Jagadeesh Harshan, B. Sundar Rajan:
High-rate, single-symbol ML decodable precoded DSTBCs for cooperative networks. IEEE Trans. Inf. Theory 55(5): 2004-2015 (2009) - [j2]Jagadeesh Harshan, B. Sundar Rajan:
Co-ordinate Interleaved Distributed Space-Time Coding for two-antenna-relays networks. IEEE Trans. Wirel. Commun. 8(4): 1783-1791 (2009) - [c6]Jagadeesh Harshan, B. Sundar Rajan:
STBCs with Reduced Sphere Decoding Complexity for Two-User MIMO-MAC. GLOBECOM 2009: 1-6 - [c5]Jagadeesh Harshan, B. Sundar Rajan:
Coding for two-user Gaussian MAC with PSK and PAM signal sets. ISIT 2009: 1859-1863 - [i9]Jagadeesh Harshan, B. Sundar Rajan:
Coding for Two-User SISO and MIMO Multiple Access Channels. CoRR abs/0901.0168 (2009) - [i8]Jagadeesh Harshan, B. Sundar Rajan, Are Hjørungnes:
High-Rate, Distributed Training-Embedded Complex Orthogonal Designs for Relay Networks. CoRR abs/0908.0051 (2009) - [i7]Jagadeesh Harshan, B. Sundar Rajan:
STBCs with Reduced Sphere Decoding Complexity for Two-User MIMO-MAC. CoRR abs/0908.1162 (2009) - [i6]Jagadeesh Harshan, B. Sundar Rajan:
Trellis Coded Modulation for Two-User Unequal-Rate Gaussian MAC. CoRR abs/0908.1163 (2009) - [i5]Jagadeesh Harshan, B. Sundar Rajan, Are Hjørungnes:
Training-Embedded, Single-Symbol ML-Decodable, Distributed STBCs for Relay Networks. CoRR abs/0909.1525 (2009) - 2008
- [j1]Jagadeesh Harshan, B. Sundar Rajan:
A Non-differential Distributed Space-Time Coding for Partially-Coherent Cooperative Communication. IEEE Trans. Wirel. Commun. 7(11-1): 4076-4081 (2008) - [c4]Jagadeesh Harshan, B. Sundar Rajan:
Single-Symbol ML Decodable Precoded DSTBCs for Cooperative Networks. ICC 2008: 991-995 - [c3]Jagadeesh Harshan, B. Sundar Rajan:
Non-Differential DSTBCs for Partially-Coherent Cooperative Communication. ICC 2008: 996-1000 - [c2]Jagadeesh Harshan, B. Sundar Rajan:
Finite signal-set capacity of two-user Gaussian Multiple Access Channel. ISIT 2008: 1203-1207 - [i4]Jagadeesh Harshan, B. Sundar Rajan:
Co-ordinate Interleaved Distributed Space-Time Coding for Two-Antenna-Relays Networks. CoRR abs/0806.1577 (2008) - [i3]Jagadeesh Harshan, B. Sundar Rajan:
A Non-differential Distributed Space-Time Coding for Partially-Coherent Cooperative Communication. CoRR abs/0806.3227 (2008) - 2007
- [c1]Jagadeesh Harshan, B. Sundar Rajan:
Coordinate Interleaved Distributed Space-Time Coding for Two-Antenna-Relays Networks. GLOBECOM 2007: 1719-1723 - [i2]Jagadeesh Harshan, B. Sundar Rajan:
High Rate Single-Symbol Decodable Precoded DSTBCs for Cooperative Networks. CoRR abs/0708.4214 (2007) - [i1]Jagadeesh Harshan, B. Sundar Rajan:
High Rate Single-Symbol ML Decodable Precoded DSTBCs for Cooperative Networks. CoRR abs/0709.0124 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-16 20:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint