default search action
Haji Muhammad Furqan
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Abuu B. Kihero, Haji M. Furqan, Mehmet Mert Sahin, Hüseyin Arslan:
6G and Beyond Wireless Channel Characteristics for Physical Layer Security: Opportunities and Challenges. IEEE Wirel. Commun. 31(3): 295-301 (2024) - 2022
- [j11]Liza Afeef, Haji M. Furqan, Hüseyin Arslan:
Physical Layer Authentication Scheme in Beamspace MIMO Systems. IEEE Commun. Lett. 26(7): 1484-1488 (2022) - [j10]Abuu B. Kihero, Haji Muhammad Furqan, Hüseyin Arslan:
Flexible Guard Structure for Timing Synchronization in Coordinated Networks. IEEE Commun. Lett. 26(10): 2505-2509 (2022) - [j9]Salah Eddine Zegrar, Haji M. Furqan, Hüseyin Arslan:
Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks. IEEE Trans. Commun. 70(4): 2635-2647 (2022) - [c12]Muhammad Sohaib J. Solaija, Haji M. Furqan, Zekeriyya Esat Ankarali, Hüseyin Arslan:
Cyclic Prefix (CP) Jamming Against Eavesdropping Relays in OFDM Systems. WCNC 2022: 1976-1980 - 2021
- [j8]Haji M. Furqan, Jehad M. Hamamreh, Huseyin Arslan:
New Physical Layer Key Generation Dimensions: Subcarrier Indices/Positions-Based Key Generation. IEEE Commun. Lett. 25(1): 59-63 (2021) - [j7]Haji M. Furqan, Muhammad Sohaib J. Solaija, Halise Türkmen, Hüseyin Arslan:
Wireless Communication, Sensing, and REM: A Security Perspective. IEEE Open J. Commun. Soc. 2: 287-321 (2021) - 2020
- [j6]Haji M. Furqan, Mehmet Ali Aygül, Mahmoud Nazzal, Hüseyin Arslan:
Primary user emulation and jamming attack detection in cognitive radio via sparse coding. EURASIP J. Wirel. Commun. Netw. 2020(1): 141 (2020) - [j5]Abdullateef Almohamad, Anas M. Tahir, Ayman Al-Kababji, Haji M. Furqan, Tamer Khattab, Mazen O. Hasna, Hüseyin Arslan:
Smart and Secure Wireless Communications via Reflecting Intelligent Surfaces: A Short Survey. IEEE Open J. Commun. Soc. 1: 1442-1456 (2020) - [c11]Haji M. Furqan, Jehad M. Hamamreh, Hüseyin Arslan:
Secure and Reliable IoT Communications Using Nonorthogonal Signals' Superposition with Dual-Transmission. PIMRC 2020: 1-6 - [c10]Mehmet Ali Aygül, Haji M. Furqan, Mahmoud Nazzal, Hüseyin Arslan:
Deep Learning-Assisted Detection of PUE and Jamming Attacks in Cognitive Radio Systems. VTC Fall 2020: 1-5
2010 – 2019
- 2019
- [j4]Jehad M. Hamamreh, Haji M. Furqan, Hüseyin Arslan:
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 21(2): 1773-1828 (2019) - 2018
- [j3]Waqas Aman, Guftaar Ahmad Sardar Sidhu, Haji M. Furqan, Zain Ali:
Enhancing physical layer security in AF relay-assisted multicarrier wireless transmission. Trans. Emerg. Telecommun. Technol. 29(6) (2018) - [j2]Haji M. Furqan, Jehad M. Hamamreh, Hüseyin Arslan:
Adaptive OFDM-IM for Enhancing Physical Layer Security and Spectral Efficiency of Future Wireless Networks. Wirel. Commun. Mob. Comput. 2018: 3178303:1-3178303:16 (2018) - [c9]Mahmoud Nazzal, Haji Muhammad Furqan, Hüseyin Arslan:
FDD Massive MIMO Downlink Channel Estimation via Selective Sparse Coding over AoA/AoD Cluster Dictionaries. PIMRC 2018: 1-5 - [i1]Waqas Aman, Guftaar Ahmad Sardar Sidhu, Haji M. Furqan, Zain Ali:
Enhancing Physical Layer Security in AF Relay Assisted Multi-Carrier Wireless Transmission. CoRR abs/1801.03728 (2018) - 2017
- [j1]Mustafa Harun Yilmaz, Ertugrul Güvenkaya, Haji M. Furqan, Selçuk Köse, Hüseyin Arslan:
Cognitive Security of Wireless Communication Systems in the Physical Layer. Wirel. Commun. Mob. Comput. 2017 (2017) - [c8]Khush Bakht, Haji M. Furqan, Zain Ali, Guftaar Ahmad Sardar Sidhu:
User Association Techniques in Future Heterogeneous Networks. FIT 2017: 18-22 - [c7]Jehad M. Hamamreh, Haji M. Furqan, Zain Ali, Guftaar Ahmad Sardar Sidhu:
An Efficient Security Method Based on Exploiting Channel State Information (CSI). FIT 2017: 288-293 - [c6]Jehad M. Hamamreh, Haji M. Furqan, Zain Ali, Guftaar Ahmad Sardar Sidhu:
Enhancing the Security Performance of OSTBC Using Pre-Equalicodization. FIT 2017: 294-298 - [c5]Haji M. Furqan, Jehad M. Hamamreh, Hüseyin Arslan:
Secure communication via untrusted switchable decode-and-forward relay. IWCMC 2017: 1333-1337 - [c4]Jehad M. Hamamreh, Haji M. Furqan, Hüseyin Arslan:
Secure pre-coding and post-coding for OFDM systems along with hardware implementation. IWCMC 2017: 1338-1343 - [c3]Haji M. Furqan, Jehad M. Hamamreh, Hüseyin Arslan:
Enhancing physical layer security of OFDM systems using channel shortening. PIMRC 2017: 1-5 - [c2]Muhammad Waqas, Zain Ali, Haji Muhammad Furqan, Guftaar Ahmad Sardar Sidhu:
Optimizing D2D transmission for secure and reliable smart grid communication. WiMob 2017: 1-5 - 2016
- [c1]Haji M. Furqan, Jehad M. Hamamreh, Hüseyin Arslan:
Secret key generation using channel quantization with SVD for reciprocal MIMO channels. ISWCS 2016: 597-602
Coauthor Index
aka: Huseyin Arslan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-04 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint