default search action
Amitav Mukherjee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c40]Amitav Mukherjee:
Jamming Vulnerability of Terahertz Wireless Networks. MILCOM 2022: 426-430 - 2020
- [j19]Amitav Mukherjee:
Energy-Efficient Beam Management in Millimeter-Wave Shared Spectrum. IEEE Wirel. Commun. 27(5): 38-43 (2020)
2010 – 2019
- 2018
- [j18]Amitav Mukherjee:
Energy Efficiency and Delay in 5G Ultra-Reliable Low-Latency Communications System Architectures. IEEE Netw. 32(2): 55-61 (2018) - [c39]Amitav Mukherjee:
Fog-Aided Data Reception in Next-Generation MIMO Radio Access Networks with Edge Sensing. ICC 2018: 1-6 - [c38]Reem Karaki, Amitav Mukherjee:
Coexistence of Contention-Based General Authorized Access Networks in 3.5 GHz CBRS Band. VTC Spring 2018: 1-6 - 2017
- [c37]Reem Karaki, Amitav Mukherjee, Jung-Fu Cheng:
Performance of Autonomous Uplink Transmissions in Unlicensed Spectrum LTE. GLOBECOM 2017: 1-6 - [c36]Reem Karaki, Jung-Fu Cheng, Evanny Obregon, Amitav Mukherjee, Du Ho Kang, Sorour Falahati, Havish Koorapaty, Oskar Drugge:
Uplink Performance of Enhanced Licensed Assisted Access (eLAA) in Unlicensed Spectrum. WCNC 2017: 1-6 - [c35]Amitav Mukherjee, Fredrik Lindqvist, Jung-Fu Cheng:
HARQ Feedback in Unlicensed Spectrum LTE: Design and Performance Evaluation. WCNC 2017: 1-6 - [c34]Henrik Sahlin, Cagatay Capar, Amitav Mukherjee:
Time-of-Arrival Estimation in Block-IFDMA Systems for LTE in Unlicensed Spectrum. WCNC 2017: 1-5 - 2016
- [j17]Amitav Mukherjee, Jung-Fu Cheng, Sorour Falahati, Havish Koorapaty, Du Ho Kang, Reem Karaki, Laetitia Falconetti, Daniel Larsson:
Licensed-Assisted Access LTE: coexistence with IEEE 802.11 and the evolution toward 5G. IEEE Commun. Mag. 54(6): 50-57 (2016) - [j16]Amitav Mukherjee:
Secret-Key Agreement for Security in Multi-Emitter Visible Light Communication Systems. IEEE Commun. Lett. 20(7): 1361-1364 (2016) - [j15]Wenhao Xiong, Amitav Mukherjee, Hyuck M. Kwon:
MIMO Cognitive Radio User Selection With and Without Primary Channel State Information. IEEE Trans. Veh. Technol. 65(2): 985-991 (2016) - [j14]Jie Yang, Hyuck M. Kwon, Amitav Mukherjee, Khanh D. Pham:
Spreading-Sequence Design for Partially Connected Multirelay Networks Under Multipath Fading. IEEE Trans. Veh. Technol. 65(3): 1420-1433 (2016) - [j13]Laetitia Falconetti, Du Ho Kang, Reem Karaki, Evanny Obregon, Jung-Fu Cheng, Havish Koorapaty, Amitav Mukherjee, Sorour Falahati, Daniel Larsson:
Design and Evaluation of Licensed Assisted Access LTE in Unlicensed Spectrum. IEEE Wirel. Commun. 23(6): 24-30 (2016) - [c33]Shuang Feng, Hyuck M. Kwon, Amitav Mukherjee:
Stochastic Geometry Analysis of Reference Signal Spoofing Attack in Wireless Cellular Networks. GLOBECOM 2016: 1-6 - 2015
- [j12]Amitav Mukherjee:
Energy Reallocation in a Multi-User Network With a Shared Harvesting Module and Storage Battery. IEEE Commun. Lett. 19(2): 279-282 (2015) - [j11]Amitav Mukherjee:
Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints. Proc. IEEE 103(10): 1747-1761 (2015) - [c32]Amitav Mukherjee, Jung-Fu Cheng, Sorour Falahati, Laetitia Falconetti, Anders Furuskar, Bruhtesfa E. Godana, Du Ho Kang, Havish Koorapaty, Daniel Larsson, Yu Yang:
System architecture and coexistence evaluation of licensed-assisted access LTE with IEEE 802.11. ICC Workshops 2015: 2350-2355 - [c31]Amitav Mukherjee, Wenhao Xiong, Hyuck M. Kwon:
CSI-unaware scheduling for coexistence of MIMO-OFDMA device-to-device links and cellular mobile terminals. MILCOM 2015: 677-682 - [c30]Wenhao Xiong, Amitav Mukherjee, Hyuck M. Kwon:
Underlay MIMO Cognitive Radio Downlink Scheduling with Multiple Primary Users and No CSI. VTC Spring 2015: 1-5 - 2014
- [j10]Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst:
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutorials 16(3): 1550-1573 (2014) - [c29]Amitav Mukherjee:
Optimal flow bifurcation in networks with dual base station connectivity and non-ideal backhaul. ACSSC 2014: 521-524 - [c28]Amitav Mukherjee:
Macro-small cell grouping in dual connectivity LTE-B networks with non-ideal backhaul. ICC 2014: 2520-2525 - 2013
- [j9]Amitav Mukherjee:
Imbalanced Beamforming by a Multi-Antenna Source for Secure Utilization of an Untrusted Relay. IEEE Commun. Lett. 17(7): 1309-1312 (2013) - [j8]Amitav Mukherjee:
Diffusion of Cooperative Behavior in Decentralized Cognitive Radio Networks With Selfish Spectrum Sensors. IEEE J. Sel. Top. Signal Process. 7(2): 175-183 (2013) - [j7]Amitav Mukherjee, A. Lee Swindlehurst:
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper. IEEE Trans. Signal Process. 61(1): 82-91 (2013) - [j6]Jing Huang, Amitav Mukherjee, A. Lee Swindlehurst:
Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels. IEEE Trans. Signal Process. 61(10): 2536-2550 (2013) - [j5]Amitav Mukherjee, A. Lee Swindlehurst:
Prescient Precoding in Heterogeneous DSA Networks with Both Underlay and Interweave MIMO Cognitive Radios. IEEE Trans. Wirel. Commun. 12(5): 2252-2260 (2013) - [c27]Amitav Mukherjee:
Queue-aware dynamic on/off switching of small cells in dense heterogeneous networks. GLOBECOM Workshops 2013: 182-187 - [c26]Amitav Mukherjee, Sayantan Choudhury:
Coordinated beamforming for mutually interfering multi-antenna wlan networks with multipacket reception. ICASSP 2013: 4859-4862 - [i13]Jing Huang, Amitav Mukherjee, A. Lee Swindlehurst:
Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels. CoRR abs/1302.1216 (2013) - [i12]Amitav Mukherjee:
Diffusion of Cooperative Behavior in Decentralized Cognitive Radio Networks with Selfish Spectrum Sensors. CoRR abs/1302.1270 (2013) - [i11]Amitav Mukherjee:
Imbalanced Beamforming by a Multi-antenna Source for Secure Utilization of an Untrusted Relay. CoRR abs/1305.4419 (2013) - [i10]Amitav Mukherjee, A. Lee Swindlehurst:
On the Detection of Passive Eavesdroppers in the MIMO Wiretap Channel. CoRR abs/1308.2357 (2013) - 2012
- [j4]Amitav Mukherjee, A. Lee Swindlehurst:
Modified Waterfilling Algorithms for MIMO Spatial Multiplexing with Asymmetric CSI. IEEE Wirel. Commun. Lett. 1(2): 89-92 (2012) - [c25]Amitav Mukherjee, Jing Huang:
Deploying multi-antenna energy-harvesting cooperative jammers in the MIMO wiretap channel. ACSCC 2012: 1886-1890 - [c24]Amitav Mukherjee, Ari Hottinen:
Learning algorithms for energy-efficient MIMO antenna subset selection: Multi-armed bandit framework. EUSIPCO 2012: 659-663 - [c23]Minyan Pei, Amitav Mukherjee, A. Lee Swindlehurst, Jibo Wei:
Rank minimization designs for underlay MIMO cognitive radio networks with completely unknown primary CSI. GLOBECOM 2012: 1150-1155 - [c22]Jing Huang, Amitav Mukherjee, A. Lee Swindlehurst:
Secrecy analysis of unauthenticated amplify-and-forward relaying with antenna selection. ICASSP 2012: 2481-2484 - [c21]Amitav Mukherjee, A. Lee Swindlehurst:
Detecting passive eavesdroppers in the MIMO wiretap channel. ICASSP 2012: 2809-2812 - [c20]Jing Huang, Amitav Mukherjee, A. Lee Swindlehurst:
Outage performance for amplify-and-forward channels with an unauthenticated relay. ICC 2012: 893-897 - [c19]Amitav Mukherjee, Ari Hottinen:
Energy-efficient device-to-device MIMO underlay network with interference constraints. WSA 2012: 105-109 - [i9]Amitav Mukherjee, Minyan Pei, A. Lee Swindlehurst:
MIMO Precoding in Underlay Cognitive Radio Systems with Completely Unknown Primary CSI. CoRR abs/1204.1096 (2012) - 2011
- [j3]Amitav Mukherjee, A. Lee Swindlehurst:
Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI. IEEE Trans. Signal Process. 59(1): 351-361 (2011) - [c18]Amitav Mukherjee, A. Lee Swindlehurst:
A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures. ACSCC 2011: 265-269 - [c17]Amitav Mukherjee, A. Lee Swindlehurst:
Prescient beamforming in multi-user interweave cognitive radio networks. CAMSAP 2011: 253-256 - [c16]Jianqi Wang, Amitav Mukherjee, A. Lee Swindlehurst:
Interference self-mitigating beamforming for the K-user MIMO IC. ICASSP 2011: 3352-3355 - [i8]Amitav Mukherjee, A. Lee Swindlehurst:
Prescient Beamforming by Primary Transmitters in Interweave Cognitive Radio Networks with a Single Primary Receiver. CoRR abs/1107.3995 (2011) - 2010
- [j2]Amitav Mukherjee, Hyuck M. Kwon:
General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks. IEEE Trans. Commun. 58(10): 2903-2915 (2010) - [j1]Don J. Torrieri, Amitav Mukherjee, Hyuck M. Kwon:
Coded DS-CDMA systems with iterative channel estimation and no pilot symbols. IEEE Trans. Wirel. Commun. 9(6): 2012-2021 (2010) - [c15]Amitav Mukherjee, A. Lee Swindlehurst:
Poisoned feedback: The impact of malicious users in closed-loop multiuser mimo systems. ICASSP 2010: 2558-2561 - [c14]Amitav Mukherjee, A. Lee Swindlehurst:
Ensuring Secrecy in MIMO Wiretap Channels with Imperfect CSIT: A Beamforming Approach. ICC 2010: 1-5 - [c13]Amitav Mukherjee, A. Lee Swindlehurst:
Equilibrium Outcomes of Dynamic Games in MIMO Channels with Active Eavesdroppers. ICC 2010: 1-5 - [c12]Tze C. Wong, Hyuck M. Kwon, Amitav Mukherjee:
Hybrid Multi-Dimensional Modulation for Gaussian and Fading Channels. VTC Fall 2010: 1-5 - [i7]Don J. Torrieri, Amitav Mukherjee, Hyuck M. Kwon:
Coded DS-CDMA Systems with Iterative Channel Estimation and no Pilot Symbols. CoRR abs/1008.3196 (2010) - [i6]Amitav Mukherjee, Hyuck M. Kwon:
General Auction-Theoretic Strategies for Distributed Partner Selection in Cooperative Wireless Networks. CoRR abs/1008.3199 (2010) - [i5]Amitav Mukherjee, A. Lee Swindlehurst:
Poisoned Feedback: The Impact of Malicious Users in Closed-Loop Multiuser MIMO Systems. CoRR abs/1008.3730 (2010) - [i4]Amitav Mukherjee, A. Lee Swindlehurst:
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI. CoRR abs/1009.2274 (2010) - [i3]Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst:
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. CoRR abs/1011.3754 (2010) - [i2]Amitav Mukherjee, A. Lee Swindlehurst:
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper. CoRR abs/1011.5274 (2010)
2000 – 2009
- 2009
- [c11]Amitav Mukherjee, A. Lee Swindlehurst:
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels. Allerton 2009: 1134-1141 - [c10]Amitav Mukherjee:
Probabilistic Voting-Theoretic Strategies for Resource Allocation in Heterogenous Wireless Networks. GLOBECOM 2009: 1-6 - [c9]Amitav Mukherjee, Hyuck M. Kwon:
Group Diversity on the Uplink of a Dense Coded-Cooperation Network. VTC Spring 2009 - [c8]Amitav Mukherjee, Hyuck M. Kwon:
CSI-Adaptive Encoded Pilot Symbols for Iterative OFDM Receiver with IRA Coding. VTC Spring 2009 - [c7]Amitav Mukherjee, Hyuck M. Kwon:
A Coalition Game Framework for Scheduling in Cooperative Diversity Networks. VTC Fall 2009 - [c6]Amitav Mukherjee, Hyuck M. Kwon:
Multicarrier Interleave-Division Multiple-Access Systems with IRA Coding and Adaptive Pilot Symbols. VTC Fall 2009 - [i1]Amitav Mukherjee, A. Lee Swindlehurst:
Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels. CoRR abs/0910.2525 (2009) - 2008
- [c5]Don J. Torrieri, Neelu Bijukchhe, Amitav Mukherjee, Hyuck M. Kwon:
Iterative EM channel estimation for turbo-coded DS-CDMA receiver under time-varying interference. WSA 2008: 174-179 - 2007
- [c4]Amitav Mukherjee, Hyuck M. Kwon:
Sum-Rate Distortion in MIMO Broadcast Channels with Irregular Limited Feedback. GLOBECOM 2007: 3205-3209 - [c3]Amitav Mukherjee, Hyuck M. Kwon:
Compact Multi-user Wideband MIMO System using Multiple-Mode Microstrip Antennas. VTC Spring 2007: 584-588 - [c2]Amitav Mukherjee, Hyuck M. Kwon:
Sum-Rate Reduction due to Limited Feedback in MIMO Broadcast Channels with Block-Diagonalization. VTC Fall 2007: 695-699 - [c1]Don J. Torrieri, Avinash Mathur, Amitav Mukherjee, Hyuck M. Kwon:
Iterative EM Based LDPC CDMA Receiver under Time Varying Interference. VTC Spring 2007: 1986-1989
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint