We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 191 results
  1. Outage-driven link selection for secure buffer-aided networks

    In this paper, we investigate secure communication in a two-hop wireless network, where multiple buffer-aided relays assist to securely forward data...

    Dawei Wang, Tianmi He, ... Qihui Wu in Science China Information Sciences
    Article 26 July 2022
  2. On optimization of cooperative MIMO for underlaid secrecy Industrial Internet of Things

    In this paper, physical layer security techniques are investigated for cooperative multi-input multi-output (C-MIMO), which operates as an underlaid...

    **nyao Wang, Xuyan Bao, ... Zesong Fei in Frontiers of Information Technology & Electronic Engineering
    Article 01 February 2023
  3. Intelligent reflecting surface assisted untrusted NOMA transmissions: a secrecy perspective

    In this paper, we investigate the intelligent reflecting surface (IRS) assisted secure transmissions for the untrusted non-orthogonal multiple access...

    Dawei Wang, Xuanrui Li, ... Qihui Wu in Science China Information Sciences
    Article 28 August 2023
  4. SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks

    The radio-cast nature of wireless communications is always exposed to the eavesdrop** attack. To safeguard 5 G communications where both the CUs...

    Rishav Dubey, Pavan Kumar Mishra, Sudhakar Pandey in Journal of Network and Systems Management
    Article 05 July 2023
  5. Physical Layer Security for MIMO Wireless System Using MRC over Rayleigh Fading Channels

    Exponentially increasing users are expected to be supported by the fifth-generation (5G) network. 5G technology is designed to meet the growing...

    Ishmit Bamel, Parmila Devi, Manoranjan Rai Bharti in SN Computer Science
    Article 15 July 2023
  6. Unified intercept probability analysis of multi-user multi-relay aided decode-and-forward wireless systems

    This paper investigates a cooperative network scenario involving a source, multiple users, and relays, all situated in the presence of multiple...

    Sudakar Singh Chauhan, Ruchi Devlal, ... Seema Narwal in International Journal of Information Technology
    Article 11 March 2024
  7. Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks

    This paper demonstrates the potential of reinforcement learning techniques for the secure joint relay and jammer selection in the dual-hop wireless...

    Anil Kumar Kamboj, Poonam **dal, Pankaj Verma in The Journal of Supercomputing
    Article 18 August 2023
  8. On Secrecy Analysis of UAV-Enabled Relaying NOMA Systems with RF Energy Harvesting

    This paper investigates the physical-layer security (PLS) for the Internet of Things (IoT) using nonorthogonal multiple access (NOMA) with an...
    Anh-Nhat Nguyen, Dac-Binh Ha, ... Chatchai Punriboon in Industrial Networks and Intelligent Systems
    Conference paper 2022
  9. Forward link outage performance of aeronautical broadband satellite communications

    High-throughput satellites (HTSs) play an important role in future millimeter-wave (mmWave) aeronautical communication to meet high speed and broad...

    Huaicong Kong, Min Lin, ... Wei** Zhu in Frontiers of Information Technology & Electronic Engineering
    Article 29 June 2021
  10. A Secrecy Offloading in Radio Frequency Energy Harvesting NOMA Heterogeneous Mobile Edge Computing Network

    This paper studies a security offloading scheme in radio frequency energy harvesting (RF EH) non-orthogonal multiple access (NOMA) enabled...
    Van-Truong Truong, Dac-Binh Ha, Minh-Thong Vo in Industrial Networks and Intelligent Systems
    Conference paper 2023
  11. Reconfiguring wireless environments via intelligent surfaces for 6G: reflection, modulation, and security

    The reconfigurable intelligent surface (RIS) has been recognized as an essential enabling technology for sixth-generation (6G) mobile communication...

    **dan Xu, Chau Yuen, ... Mérouane Debbah in Science China Information Sciences
    Article 20 February 2023
  12. Secrecy Performance of Scenario with Multiple Antennas Cooperative Satellite Networks

    The evolution of communication networks has created a huge requirement for massive connectivity, efficient spectral utilization, and high...
    Nhat-Tien Nguyen, Hong-Nhu Nguyen, Miroslav Voznak in Multimedia Communications, Services and Security
    Conference paper 2022
  13. Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system

    In a hybrid automatic repeat request with chase combining (HARQ-CC) system, we analyze physical layer secure performance and determine the secrecy...

    Yue Wu, Shishu Yin, ... Hongwen Yang in Science China Information Sciences
    Article 15 January 2020
  14. Physical Layer Security Optimisation for NOMA Based UAV Communication for Optimal Resource Allocation

    Unmanned aerial vehicles (UAVs) have become increasingly popular for wireless communication due to their mobility, versatility in deployment, and...
    Monali Prajapati, Pramod Tripathi in Computing Science, Communication and Security
    Conference paper 2023
  15. Secure transmission for heterogeneous cellular network with limited feedback

    We study physical layer secure transmission with limited feedback in heterogeneous cellular networks. A transmission protocol is designed to obtain...

    Wenyu Jiang, Kaizhi Huang, ... **aoming Xu in Science China Information Sciences
    Article 11 November 2020
  16. Chaotic deep neural network based physical layer key generation for massive MIMO

    Massive MIMO is a promising technology for delivering fifth and beyond generation mobile communication networks. Generalized Spatial Modulation...

    C. Ismayil Siyad, S. Tamilselvan in International Journal of Information Technology
    Article 30 July 2021
  17. Image transmission in mobile wireless multimedia sensor networks using cat swarm optimization

    High-quality picture transmission over intelligent devices in Mobile Multimedia Sensor Networks (MWMSN) requires fast transmission rates, throughput,...

    Praveen Kumar Devulapalli, Satish Kumar G.A.E., ... Sumalatha Rachapogula in Multimedia Tools and Applications
    Article 24 July 2023
  18. An intelligent dimension-based cat swarm optimization for efficient cooperative multi-hop relay selection in vehicular network

    A revolutionary concept for enhancing the geographical differentiations in vehicular ad hoc networks (VANET) is cooperation. Similar to multi-antenna...

    Uppula Kiran, Krishan Kumar, ... Abdul Azeem in Neural Computing and Applications
    Article 10 April 2023
  19. Physical Layer Security of Heterogenous Networks with Unreliable Wireless Backhaul and Small Cell Selections

    In this study, we propose a novel secure heterogeneous network system model that incorporates an unreliable wireless backhaul and perfect channel...
    Eoin O’Boyle, **nkai Cheng, Cheng Yin in Industrial Networks and Intelligent Systems
    Conference paper 2023
  20. Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks

    In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harvesting secondary system can share the spectrum of...
    Conference paper 2019
Did you find what you were looking for? Share feedback.