default search action
Sapna Thapar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Secure Transmission in NOMA-Enabled Industrial IoT With Resource-Constrained Untrusted Devices. IEEE Trans. Ind. Informatics 20(1): 411-420 (2024) - [j4]Sapna Thapar, Deepak Mishra, Ravikant Saini, Zhiguo Ding:
Pair Outage Probability Minimization for NOMA Among Resource-Constrained IoT Users. IEEE Trans. Veh. Technol. 73(8): 11362-11377 (2024) - 2023
- [i9]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices. CoRR abs/2308.08800 (2023) - [i8]Sapna Thapar, Deepak Mishra, Derrick Wing Kwan Ng, Ravikant Saini:
Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error. CoRR abs/2308.08804 (2023) - [i7]Sapna Thapar, Insha Amin, Deepak Mishra, Ravikant Saini:
Secrecy Outage Probability Analysis for Downlink NOMA with Imperfect SIC at Untrusted Users. CoRR abs/2308.08811 (2023) - [i6]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization. CoRR abs/2308.08813 (2023) - [i5]Sapna Thapar, Deepak Mishra, Ravikant Saini, Zhiguo Ding:
User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMA. CoRR abs/2308.08818 (2023) - 2022
- [j3]Pradosh Kumar Hota, Sapna Thapar, Deepak Mishra, Ravikant Saini, Ankit Dubey:
Ergodic Performance of Downlink Untrusted NOMA System With Imperfect SIC. IEEE Commun. Lett. 26(1): 23-26 (2022) - [c8]Sapna Thapar, Deepak Mishra, Ravikant Saini, Zhiguo Ding:
User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMA. VTC Fall 2022: 1-5 - [c7]Sapna Thapar, Ganesh Prasad, Deepak Mishra, Ravikant Saini:
Optimal AI-Enabled Secured NOMA Among Untrusted Users. VTC Fall 2022: 1-5 - [c6]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization. WCNC 2022: 1993-1998 - 2021
- [j2]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Decoding Orders for Securing Untrusted NOMA. IEEE Netw. Lett. 3(1): 27-30 (2021) - [c5]Sapna Thapar, Insha Amin, Deepak Mishra, Ravikant Saini:
Secrecy Outage Probability Analysis for Downlink NOMA with Imperfect SIC at Untrusted Users. EUSIPCO 2021: 1696-1700 - [c4]Sapna Thapar, Deepak Mishra, Derrick Wing Kwan Ng, Ravikant Saini:
Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error. GLOBECOM 2021: 1-6 - [i4]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Secrecy Fairness Aware NOMA for Untrusted Users. CoRR abs/2103.16463 (2021) - [i3]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Decoding Orders for Securing Untrusted NOMA. CoRR abs/2103.16478 (2021) - [i2]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective. CoRR abs/2103.16503 (2021) - [i1]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users. CoRR abs/2103.16814 (2021) - 2020
- [j1]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users. IEEE Trans. Veh. Technol. 69(11): 13259-13272 (2020) - [c3]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective. WCNC 2020: 1-6
2010 – 2019
- 2019
- [c2]Sapna Thapar, Deepak Mishra, Ravikant Saini:
Secrecy Fairness Aware NOMA for Untrusted Users. GLOBECOM 2019: 1-6 - 2016
- [c1]Sapna Thapar, Purnendu Karmakar:
Performance evaluation of LTE network: An energy saving and capacity gain perspective. ICACCI 2016: 2532-2538
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint