Communication vs distributed computation: An alternative trade-off curve YH Ezzeldin, M Karmoose, C Fragouli 2017 IEEE Information Theory Workshop (ITW), 279-283, 2017 | 53 | 2017 |
Cooperation-based multi-hop routing protocol for cognitive radio networks A Guirguis, M Karmoose, K Habak, M El-Nainay, M Youssef Journal of Network and Computer Applications 110, 27-42, 2018 | 35* | 2018 |
Methods and arrangements for vehicle-to-vehicle communications M Karmoose, R Misoczki, L Yang, X Liu, M Ambrosin, MR Sastry US Patent 10,805,086, 2020 | 21 | 2020 |
Dead zone penetration protocol for cognitive radio networks M Karmoose, K Habak, M ElNainay, M Youssef 2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013 | 19 | 2013 |
Private broadcasting: An index coding approach M Karmoose, L Song, M Cardone, C Fragouli 2017 IEEE International Symposium on Information Theory (ISIT), 2543-2547, 2017 | 15 | 2017 |
Privacy in Index Coding: -Limited-Access Schemes M Karmoose, L Song, M Cardone, C Fragouli IEEE Transactions on Information Theory 66 (5), 2625-2641, 2019 | 10 | 2019 |
Distorting an adversary's view in cyber-physical systems GK Agarwal, M Karmoose, S Diggavi, C Fragouli, P Tabuada 2018 IEEE Conference on Decision and Control (CDC), 1476-1481, 2018 | 7 | 2018 |
Censoring for improved sensing performance in infrastructure-less cognitive radio networks M Seif, M Karmoose, M Youssef 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 1-5, 2015 | 6 | 2015 |
Stability analysis in a cognitive radio system with cooperative beamforming M Karmoose, A Sultan, M Youssef 2013 IEEE Wireless Communications and Networking Conference (WCNC), 637-642, 2013 | 6 | 2013 |
Using mm-waves for secret key establishment M Karmoose, C Fragouli, S Diggavi, R Misoczki, LL Yang, Z Zhang IEEE Communications Letters 23 (6), 1077-1080, 2019 | 5* | 2019 |
Preserving privacy while broadcasting: K-limited-access schemes M Karmoose, L Song, M Cardone, C Fragouli 2017 IEEE Information Theory Workshop (ITW), 514-518, 2017 | 4 | 2017 |
Censoring for type-based multiple access scheme in wireless sensor networks M Karmoose, KG Seddik, H El Kamchouchi 2012 IEEE Vehicular Technology Conference (VTC Fall), 1-6, 2012 | 4 | 2012 |
Distortion-Based Lightweight Security for Cyber-Physical Systems GK Agarwal, M Karmoose, S Diggavi, C Fragouli, P Tabuada IEEE Transactions on Automatic Control 66 (4), 1588-1601, 2020 | 3 | 2020 |
Transport block mapping across slots M Karmoose, JH Bae US Patent App. 17/856,942, 2022 | 2 | 2022 |
Methods and apparatus for random access with contention resolution message repetition JH Bae, M Karmoose, YMMK Fouad US Patent App. 17/233,435, 2021 | 2 | 2021 |
Simplifying wireless social caching via network coding M Karmoose, M Cardone, C Fragouli IEEE Transactions on Communications 66 (11), 5512-5525, 2018 | 2 | 2018 |
Privacy in index coding: Improved bounds and coding schemes M Karmoose, L Song, M Cardone, C Fragouli 2018 IEEE International Symposium on Information Theory (ISIT), 831-835, 2018 | 2 | 2018 |
Simplifying wireless social caching M Karmoose, M Cardone, C Fragouli 2016 IEEE International Symposium on Information Theory (ISIT), 410-414, 2016 | 2 | 2016 |
Beam refinement for in-active state data transmission L Hu, JH Bae, M Karmoose US Patent 11,606,784, 2023 | 1 | 2023 |
Systems, methods, and devices for beam management for random access L Hu, JH Bae, M Karmoose, P Sartori US Patent App. 17/407,177, 2022 | 1 | 2022 |