Results 61 to 70 of about 1,051 (211)

A Novel Joint Radar-communication Waveform Design Method Based on Distributed Aperture

open access: yesLeida xuebao, 2023
Joint radar-communication waveform design has been the focus of intensive research in recent years. The integrated waveform based on a collocated antenna can simultaneously detect targets and communicate with multiple users in different directions ...
Liu LIU   +4 more
doaj   +1 more source

An Anti-Eavesdropping Method in Data Collection of Smart Meter

open access: yesJournal of Computer and Communications, 2019
At present, DL/T 645-2007 communication protocol is used to collect data for smart meters. However, in the beginning, this protocol is not designed to be a secure protocol and only the function and reliability were taken into account. Plaintext is used in the protocol for data transmission, as a result, attackers can easily sniff the information and ...
Weiwei Dong   +4 more
openaire   +2 more sources

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper

open access: yesIEEE Access, 2019
In this paper, we analyze the anti-eavesdropping and anti-jamming performance of D2D communications with a full-duplex active eavesdropper (FAE). We consider the scenario that when the FAE intrudes the D2D underlaying cellular networks, it can passively ...
Yijie Luo   +5 more
doaj   +1 more source

Improving Anti-Eavesdropping Ability Without Eavesdropper’s CSI: A Practical Secure Transmission Design Perspective [PDF]

open access: yesIEEE Wireless Communications Letters, 2018
4 pages, 2 figures, to be published on IEEE Wireless Communications Letters (WCL)
Tong-Xing Zheng, Hui-Ming Wang, Hao Deng
openaire   +2 more sources

Molecular Communication Is the Internet of Brain Missing Key: A Comprehensive Overview of Background Technologies and the Generic Framework

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
A novel three‐layer architecture is proposed for cell‐to‐cell communication, integrating molecular, nano‐electronic, and digital components. It enables bio‐integrated applications such as remote emotional touching, consensual telepathy, and autonomous drug delivery. Molecular Communication (MC) is utilized with advanced implants, modulation techniques,
Saeed Banaeian Far   +2 more
wiley   +1 more source

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

open access: yes, 2014
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence
Fakoorian, S. A. A.   +3 more
core   +1 more source

Distributed source-relay selection scheme for vehicular relaying networks under eavesdropping attacks [PDF]

open access: yes, 2014
The recent development of vehicular networking technologies brings the promise of improved driving safety and traffic efficiency. Cooperative communication is recognized as a low-complexity solution for enhancing both the reliability and the throughput ...
Li Sun, Pinyi Ren, Qinghe Du
core   +1 more source

Secure Degree of Freedom of Wireless Networks Using Collaborative Pilots

open access: yes, 2023
A wireless network of full-duplex nodes/users, using anti-eavesdropping channel estimation (ANECE) based on collaborative pilots, can yield a positive secure degree-of-freedom (SDoF) regardless of the number of antennas an eavesdropper may have.
Hua, Yingbo   +2 more
core   +1 more source

Culpable Ignorance and Causal Deviance

open access: yesRatio, Volume 39, Issue 1, Page 26-34, March 2026.
ABSTRACT I argue that tracing theorists of culpability for ignorant wrongdoing should reject the widely accepted principle that culpability for ignorant wrongdoing should always be traced through culpability for the ignorance itself. Two kinds of cases are considered in which culpability for ignorant wrongdoing ultimately traces back to culpability for
Thomas A. Yates
wiley   +1 more source

Home - About - Disclaimer - Privacy