default search action
Majid Moradikia
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Ahmad Ghasemi, Ehsan Zeraatkar, Majid Moradikia, Seyed A. Zekavat:
Adversarial Attacks on Graph Neural Networks Based Spatial Resource Management in P2P Wireless Communications. IEEE Trans. Veh. Technol. 73(6): 8847-8863 (2024) - [j18]Hamid Reza Hashempour, Hamed Bastami, Majid Moradikia, Seyed A. Zekavat, Hamid Behroozi, Gilberto Berardinelli, A. Lee Swindlehurst:
Secure SWIPT in the Multiuser STAR-RIS Aided MISO Rate Splitting Downlink. IEEE Trans. Veh. Technol. 73(9): 13466-13481 (2024) - [c5]Ahmad Ghasemi, Majid Moradikia, Seyed Reza Zekavat, Hossein Pishro-Nik:
Adversarial Attacks Targeting Point-to-Point Wireless Networks. VTC Spring 2024: 1-6 - 2023
- [j17]Mahdi Nouri, Hamid Behroozi, Hamed Bastami, Majid Moradikia, Alireza Jafarieh, Ahmed Abdelhadi, Zhu Han:
Hybrid Precoding Based on Active Learning for mmWave Massive MIMO Communication Systems. IEEE Trans. Commun. 71(5): 3043-3058 (2023) - [j16]Hamed Bastami, Hamid Behroozi, Majid Moradikia, Ahmed Abdelhadi, Derrick Wing Kwan Ng, Lajos Hanzo:
Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel. IEEE Trans. Veh. Technol. 72(7): 9267-9280 (2023) - [c4]Himan Namdari, Majid Moradikia, Douglas Todd Petkie, Radwin Askari, Seyed A. Zekavat:
Comprehensive GPR Signal Analysis via Descriptive Statistics and Machine Learning. WiSEE 2023: 127-132 - [c3]Ahmad Ghasemi, Ehsan Zeraatkar, Majid Moradikia, Seyed Reza Zekavat:
Adversarial Attacks on Resource Management in P2P Wireless Communications. WiSEE 2023: 148-153 - 2022
- [j15]Ahmad Hassanpour, Majid Moradikia, Bian Yang, Ahmed Abdelhadi, Christoph Busch, Julian Fiérrez:
Differential Privacy Preservation in Robust Continual Learning. IEEE Access 10: 24273-24287 (2022) - [j14]Hamid Reza Hashempour, Majid Moradikia, Hamed Bastami, Ahmed Abdelhadi, Mojtaba Soltanalian:
Fast and Robust LRSD-Based SAR/ISAR Imaging and Decomposition. IEEE Trans. Geosci. Remote. Sens. 60: 1-13 (2022) - [j13]Hamed Bastami, Majid Moradikia, Ahmed Abdelhadi, Hamid Behroozi, Bruno Clerckx, Lajos Hanzo:
Maximizing the Secrecy Energy Efficiency of the Cooperative Rate-Splitting Aided Downlink in Multi-Carrier UAV Networks. IEEE Trans. Veh. Technol. 71(11): 11803-11819 (2022) - [c2]Eyad Shtaiwi, Ahmed El Ouadrhiri, Majid Moradikia, Salma Sultana, Ahmed Abdelhadi, Zhu Han:
Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks. GLOBECOM 2022: 1472-1477 - [i6]Eyad Shtaiwi, Ahmed El Ouadrhiri, Majid Moradikia, Salma Sultana, Ahmed Abdelhadi, Zhu Han:
Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks. CoRR abs/2205.15743 (2022) - [i5]Hamed Bastami, Hamid Behroozi, Majid Moradikia, Ahmed Abdelhadi, Derrick Wing Kwan Ng, Lajos Hanzo:
Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel. CoRR abs/2209.12591 (2022) - [i4]Hamed Bastami, Majid Moradikia, Hamid Behroozi, Lajos Hanzo:
Secrecy Rate of the Cooperative RSMA-Aided UAV Downlink Relying on Optimal Relay Selection. CoRR abs/2210.03926 (2022) - [i3]Hamidreza Hashempour, Hamed Bastami, Majid Moradikia, Seyed A. Zekavat, Hamid Behroozi, A. Lee Swindlehurst:
Secure SWIPT in STAR-RIS Aided Downlink MISO Rate-Splitting Multiple Access Networks. CoRR abs/2211.09081 (2022) - 2021
- [j12]Anahita Asadipooya, Sadegh Samadi, Majid Moradikia, Reza Mohseni:
Majorization-Minimization approach for real-time enhancement of sparsity-driven SAR imaging. J. Real Time Image Process. 18(5): 1441-1455 (2021) - [j11]Hamed Bastami, Majid Moradikia, Hamid Behroozi, Rodrigo C. de Lamare, Ahmed Abdelhadi, Zhiguo Ding:
Secrecy rate maximization for hardware impaired untrusted relaying network with deep learning. Phys. Commun. 49: 101476 (2021) - [j10]Majid Moradikia, Sadegh Samadi, Hamid Reza Hashempour, Müjdat Çetin:
Video-SAR Imaging of Dynamic Scenes Using Low-Rank and Sparse Decomposition. IEEE Trans. Computational Imaging 7: 384-398 (2021) - [j9]Hamed Bastami, Mehdi Letafati, Majid Moradikia, Ahmed Abdelhadi, Hamid Behroozi, Lajos Hanzo:
On the Physical Layer Security of the Cooperative Rate-Splitting-Aided Downlink in UAV Networks. IEEE Trans. Inf. Forensics Secur. 16: 5018-5033 (2021) - [c1]Hamed Bastami, Majid Moradikia, Mehdi Letafati, Ahmed Abdelhadi, Hamid Behroozi:
Outage-Constrained Robust and Secure Design for Downlink Rate-Splitting UAV Networks. ICC Workshops 2021: 1-7 - 2020
- [j8]Saeed Mashdour, Majid Moradikia, Phee Lep Yeoh:
Secure mm-Wave communications with imperfect hardware and uncertain eavesdropper location. Trans. Emerg. Telecommun. Technol. 31(10) (2020) - [i2]Saeed Mashdour, Majid Moradikia, Phee Lep Yeoh:
Secure mm-Wave Communications with Imperfect Hardware and Uncertain Eavesdropper Location. CoRR abs/2005.05439 (2020)
2010 – 2019
- 2019
- [j7]Majid Moradikia, Hamed Bastami, Ali Kuhestani, Hamid Behroozi, Lajos Hanzo:
Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments. IEEE Access 7: 116942-116964 (2019) - [j6]Ahmad Hassanpour, Majid Moradikia, Hojjat Adeli, Seyed Raouf Khayami, Pirooz Shamsinejadbabaki:
A novel end-to-end deep learning scheme for classifying multi-class motor imagery electroencephalography signals. Expert Syst. J. Knowl. Eng. 36(6) (2019) - [j5]Majid Moradikia, Sadegh Samadi, Müjdat Çetin:
Joint SAR Imaging and Multi-Feature Decomposition From 2-D Under-Sampled Data Via Low-Rankness Plus Sparsity Priors. IEEE Trans. Computational Imaging 5(1): 1-16 (2019) - 2018
- [j4]Majid Moradikia, Saeed Mashdour, Ali Jamshidi:
Joint optimal power allocation, cooperative beamforming, and jammer selection design to secure untrusted relaying network. Trans. Emerg. Telecommun. Technol. 29(3) (2018) - [j3]Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad R. A. Khandaker:
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks. IEEE Trans. Wirel. Commun. 17(7): 4302-4314 (2018) - 2017
- [i1]Ali Kuhestani, Abbas Mohammadi, Kai-Kit Wong, Phee Lep Yeoh, Majid Moradikia, Muhammad R. A. Khandaker:
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks. CoRR abs/1709.01334 (2017) - 2016
- [j2]Houman Zarrabi, Ali Kuhestani, Majid Moradikia:
EE-RS and PA for untrusted relay network at high signal-to-noise ratio regime. IET Commun. 10(16): 2143-2148 (2016) - 2015
- [j1]Mohammad Ali Pourmina, Majid Moradikia:
Stackelberg Game on Space and Frequency Heterogeneity Analysis in an OFDMA-Based Cognitive Spectrum Leasing. Wirel. Pers. Commun. 84(1): 341-359 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint