![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Shilpa Thakur
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c6]Shilpa Thakur, Nathalia Diaz Armas, Joseph Adegite, Ritwik Pandey, Joey Mead, Pratap M. Rao, Cagdas D. Onal:
A Tetherless Soft Robotic Wearable Haptic Human Machine Interface for Robot Teleoperation. IROS 2024: 12226-12233 - 2023
- [j6]Shilpa Thakur
, Ajay Singh
, Sudhan Majhi
:
Secrecy Analysis of Underlay CRN in the Presence of Correlated and Imperfect Channel. IEEE Trans. Cogn. Commun. Netw. 9(3): 754-764 (2023) - [c5]Surjeet Kumar, Shilpa Thakur, Ajay Singh:
Secrecy Performance of Energy Harvesting Based D2D Communications in Spectrum-Sharing Networks. ICOIN 2023: 410-414 - 2022
- [j5]Shilpa Thakur
, Ajay Singh
:
Secrecy Performance of Underlay Cognitive Radio Networks With Primary Interference. IEEE Trans. Netw. Sci. Eng. 9(4): 2641-2657 (2022) - 2021
- [j4]Shilpa Thakur
, Ajay Singh
:
Underlay Cognitive Radio With Instantaneous Interference Constraint: A Secrecy Performance. IEEE Trans. Veh. Technol. 70(8): 7839-7844 (2021) - 2020
- [j3]Shilpa Thakur, Ajay Singh
:
Secure transmission using optimal antenna selection for MIMO underlay CRN with multiple primary users. IET Commun. 14(7): 1090-1101 (2020)
2010 – 2019
- 2019
- [j2]Shilpa Thakur
, Ajay Singh:
Secure transmission in underlay cognitive radio network with outdated channel state information. Phys. Commun. 37 (2019) - [c4]Shilpa Thakur, Ajay Singh:
Secrecy performance Analysis for Underlay Cognitive Radio Network with Optimal Antenna Selection and Generalized Receiver Selection. ANTS 2019: 1-6 - [c3]Shilpa Thakur
, Ajay Singh:
Ergodic Secrecy Capacity in Nakagami-m Fading Channels. ICCST 2019: 1-3 - [c2]Shilpa Thakur
, Ajay Singh:
Secrecy Performance of Cognitive Radio Networks Using Arbitrary Transmit Antenna Selection and Threshold- Based MRC. VTC Fall 2019: 1-5 - 2018
- [j1]Shilpa Thakur
, Ajay Singh:
Secrecy analysis of cognitive radio network with MS-GSC/MRC scheme. EURASIP J. Wirel. Commun. Netw. 2018: 114 (2018) - [c1]Shilpa Thakur
, Anshu Thakur, Surinder Soni, Ajay Singh:
On the Performance of GSC/MRC based Cognitive Radio Networks with Multiple Primary Users. ICIIS 2018: 251-257
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint