[J40] S. Islam, S. Alam, M. R. A. Khandaker, R. T. Khan, and F. Tariq, ``Deep Reinforcement Learning for Multi-Objective Optimization in V2X Communication With URLLC,'' IEEE Trans. Wireless Commun., submitted, 2022.
[J39] K. Ikeagu, M. R. A. Khandaker, F. Tariq, and K.-K. Wong, ``Secure Hybrid Precoder and Combiner Design for Terahertz MIMO Communications with Intelligent Reflecting Surface,'' IEEE Trans. Commun., submitted, 2022.
[J38] Z. Du, M. R. A. Khandaker, and F. Tariq, ``Intelligent Reflecting Surface-Aided Proactive Jamming for Secure Communication,'' IEEE Trans. Commun., submitted, June 2022.
[J37] S. Islam, S. Alam, M. R. A. Khandaker, R. T. Khan, F. Tariq, and A. Toding, ``Deep Q-learning based resource allocation in interference systems with outage constraint,'' IEEE Trans. Veh. Technol., revised, June 2022.
[J36] M. E. Haque, F. Tariq, M. R. A. Khandaker, M. A. Imran, and K.-K. Wong, ``URLLC: A Comprehensive Survey of 5G Approaches and Outlook for 6G,'' IEEE Commun. Surveys & Tutorials, submitted, June. 2022.
[J35] Y. Song, M. R. A. Khandaker, F. Tariq, K.-K. Wong, and Z. Zheng, ``Deep learning based intelligent reflecting surface design for secure communication,'' IEEE Access, revised, Jun. 2022.
[J34] C. O. Nnamani, M. R. A. Khandaker, and M. Sellathurai, ``Joint beamforming and location optimization for secure data collection in wireless sensor networks with UAV-carried intelligent reflecting surface,'' IEEE Trans. Commun., submitted, Jan. 2022.
[J33] S. Zaman, M. R. A. Khandaker, R. T. Khan, F. Tariq, and K.-K. Wong, ``Thinking out of the blocks: Holochain for distributed security in IoT healthcare,'' IEEE Access, vol. 10, pp. 37064-37081, Mar. 2022.
[J32] V. A. Thakor, M. A. Razzaque and M. R. A. Khandaker, ``Lightweight Cryptography Algorithms for resource-constrained IoT devices: A Review, Comparison and Research Opportunities,'' IEEE Access, vol. 9, pp. 28177-28193, Jan. 2021.
[J31] M. T. Rahman, R. T. Khan, M. R. A. Khandaker, M. Sellathurai, and M. S. A. Salan, ``An automated contact tracing approach for controlling Covid-19 spread based on geolocation data from mobile cellular networks,'' IEEE Access, vol. 8, pp. 213554-213565, Nov. 2020.
[J30] C. O. Nnamani, M. R. A. Khandaker, and M. Sellathurai, ``UAV-aided jamming for secure ground communication with unknown eavesdropper location,'' IEEE Access, vol. 8, pp. 72881-72892, Apr. 2020.
[J29] F. Tariq, M. R. A. Khandaker, K.-K. Wong, M. Imran, M. Bennis, and M. Debbah, ``A speculative study on 6G,'' IEEE Wireless Commun. Magazine, vol. 27, no. 4, pp. 118–125, 2020. Available: https://arxiv.org/pdf/1902.06700.pdf.
[J28] M. R. A. Khandaker, C. Masouros, K.-K. Wong, S. Timotheo, ``Secure SWIPT by exploiting constructive interference and artificial noise,'' IEEE Trans. Commun., vol. 67, pp. 1326-1340, Feb. 2019.
[J27] M. T. Kabir, M. R. A. Khandaker, and C. Masouros, ``A scalable performance-complexity tradeoff for robust full-duplex beamforming,'' IEEE Trans. Veh. Technol., Oct. 2017.
[J26] M. T. Kabir, M. R. A. Khandaker, and C. Masouros, ``Interference exploitation in full duplex communications: Trading interference power for both uplink and downlink power savings,'' IEEE Trans. Wireless Commun., vol. 17, pp. 8314-8329, Dec. 2018.
[J25] A. Mukherjee, T. Acharya, and M. R. A. Khandaker, ``Outage analysis for SWIPT-enabled two-way cognitive cooperative communications,'' IEEE Trans. Veh. Technol., vol. 67, pp. 9032-9036, Sep. 2018.
[J24] M. T. Kabir, M. R. A. Khandaker, and C. Masouros, ``Robust Energy Harvesting FD Transmission: Interference Suppression Versus Exploitation,'' IEEE Commun. Lett., vol. 22, pp. 1866-1869, Sep. 2018.
[J23] M. R. A. Khandaker, C. Masouros, and K.-K. Wong, ``Constructive interference based secure precoding: A new dimension in physical layer security,'' IEEE Trans. Inf. Forensics Security, vol. 13, pp. 2256-2268, Sep. 2018.
[J22] A. Kuhestani, A. Mohammadi, K.-K. Wong, P. L. Yeoh, M. Moradikia, and M. R. A. Khandaker, ``Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks,'' IEEE Trans. Wireless Commun., vol. 17, pp. 4302 - 4314, July 2018.
[J21] A. A. Okandeji, M. R. A. Khandaker, K.-K. Wong, G. Zheng, Y. Zhang, and Z. Zheng, ``Secure full-duplex two-way relaying for SWIPT,'' IEEE Wireless Commun. Letters, vol. 7, pp. 336-339, June 2018.
[J20] A. A. Okandeji, M. R. A. Khandaker, K.-K. Wong, Y. Zhang, and Z. Zheng, ``Secure beamforming design for SWIPT in MISO full-duplex systems,'' in ZTE Communications, Special Topic: Wireless Data and Energy Integrated Communication Networks, ZTE, vol. 16, pp. 38-46, Feb. 2018.
[J19] A. A. Okandeji, M. R. A. Khandaker, K.-K. Wong, Y. Zhang, and Z. Zheng, ``SWIPT in MISO full-duplex systems,'' IEEE/KICS J. Commun. Netw., vol. 19, pp. 469-479, Oct. 2017.
[J18] M. R. A. Khandaker, K.-K. Wong, and G. Zheng, ``Truth-telling mechanism for two-way relay selection for secrecy communications with energy-harvesting revenue,'' IEEE Trans. Wireless Commun., vol. 16, pp. 3111-3123, May 2017.
[J17] M. R. A. Khandaker and K.-K. Wong, ``Joint source and relay optimization for interference MIMO relay networks,'' EURASIP J. Adv. Signal Process., Mar. 2017 (24).
[J16] J. Liao, K.-K. Wong, and M. R. A. Khandaker, ``Optimizing cache placement for heterogeneous small cell networks,'' IEEE Commun. Letters, vol. 21, pp. 120-123, Jan. 2017.
[J15] M. R. A. Khandaker and K.-K. Wong,Y. Zhang, and Z. Zheng, ``Probabilistically robust SWIPT for secrecy MISOME systems,'' IEEE Trans. Inf. Forensics Security, vol. 12, pp. 211-226, Jan. 2017.
[J14] J. Liao, M. R. A. Khandaker and K.-K. Wong, ``Robust power-splitting SWIPT beamforming for broadcast channels,'' IEEE Commun. Letters, vol. 20, pp. 181–184, Jan. 2016.
[J13] M. R. A. Khandaker and K.-K. Wong, ``Robust secrecy beamforming in the presence of energy-harvesting eavesdroppers,'' IEEE Wireless Commun. Letters, vol. 4, pp. 10–13, Feb. 2015.
[J12] M. R. A. Khandaker and K.-K. Wong, ``Masked beamforming in the presence of energy-harvesting eavesdroppers,'' IEEE Trans. Inf. Forensics Security, vol. 10, pp. 40-54, Jan. 2015.
[J11] A. Toding, M. R. A. Khandaker, and Y. Rong, ``Joint source and relay design for MIMO multi-relay systems using projected gradient approach,'' EURASIP J. Wireless Commun. Networking, 2014:151.
[J10] M. R. A. Khandaker and Y. Rong, ``Transceiver design for multi-hop MIMO relay multicasting from multiple sources,'' IEEE Trans. Wireless Commun., vol. 13, pp. 5162-5172, Sept. 2014.
[J9] M. R. A. Khandaker and K.-K. Wong, ``SWIPT in MISO multicasting systems,'' IEEE Wireless Commun. Letters, vol. 3, pp. 277-280, June 2014.
[J8] M. R. A. Khandaker and Y. Rong, ``Precoding design for MIMO relay multicasting,'' IEEE Trans. Wireless Commun., vol. 12, pp. 3544–3555, Jul. 2013.
[J7] M. R. A. Khandaker and Y. Rong, ``Interference MIMO relay channel: Joint power control and transceiver-relay beamforming,'' IEEE Trans. Signal Process., vol. 60, pp. 6509–6518, Dec. 2012.
[J6] M. R. A. Khandaker and Y. Rong, ``Joint transceiver optimization for multiuser MIMO relay communication systems,'' IEEE Trans. Signal Process., vol. 60, pp. 5977–5986, Nov. 2012.
[J5] A. Toding, M. R. A. Khandaker, and Y. Rong, ``Joint source and relay optimization for parallel MIMO relay networks,'' EURASIP Journal Adv. Sig. Process., vol. 2012:174, Aug. 2012.
[J4] Y. Rong, M. R. A. Khandaker, and Y. Xiang, ``Channel Estimation of Dual-Hop MIMO Relay Systems via Parallel Factor Analysis,'' IEEE Trans. Wireless Commun., vol. 11, pp. 2224-2233, Jun. 2012.
[J3] Y. Rong and M. R. A. Khandaker, ``On Uplink-Downlink Duality of Multi-Hop MIMO Relay Channel,'' IEEE Trans. Wireless Commun., vol. 10, pp. 1923-1931, Jun. 2011.
[J2] M. S. Hossain, M. I. Islam, and M. R. A. Khandaker, ``A comparative study of cell based and tree based call admission control for mobile cellular network,'' Journal Computer Science, vol. 1, pp. 30–32, Jun. 2007.
[J1] M. R. A. Khandaker, M. J. Kaiser, J. K. Das, M. S. Hossain, and K. R. Sultana, ``Upgrading trust factor evaluation in AODV protocol for MANET,'' Journal Computer Science, vol. 1, pp. 40–43, Jun. 2007.