Results 21 to 30 of about 769,138 (291)

Robust Beamforming Design for Secure DM-Based Relay Networks With Self-Sustained Jammers

open access: yesIEEE Access, 2019
In this paper, we propose to use self-sustained jammers to generate artificial noise with the aim of enhancing the physical layer security of a directional modulation (DM) relay system.
Xiaobo Zhou   +4 more
doaj   +1 more source

Artificial-Noise-Aided CQI-Mapped Generalized Spatial Modulation

open access: yesIEEE Transactions on Vehicular Technology, 2023
The artificial noise (AN) aided channel quality indicator (CQI) mapped generalized spatial modulation (GSM) philosophy is proposed for improving the security of legitimate links. Given the randomness of the legitimate CQI, eavesdroppers cannot successfully decode the confidential information. We analyse both the secrecy rate as well as the eavesdropper’
Weijun Yin   +4 more
openaire   +3 more sources

Cooperative Beamforming With Artificial Noise Injection for Physical-Layer Security

open access: yesIEEE Access, 2023
In the sixth-generation (6G) communications, how to deploy and manage massively connected Internet-of-Things (IoT) nodes will be one of the key technical challenges, because 6G is expected to provide 10 times higher connection, compared to 5G.
Geunyeong Jang   +3 more
doaj   +1 more source

Directional Modulation-Enhanced Multiple Antenna Arrays for Secure and Precise Wireless Transmission

open access: yesSensors, 2019
Directional modulation (DM) technique has the ability to enhance the physical layer security (PLS) of wireless communications. Conventional DM schemes are usually based on a single antenna array with the basic assumption that eavesdroppers (Eves) and ...
Wei Zhang   +4 more
doaj   +1 more source

Covert Wireless Communication With Artificial Noise Generation

open access: yesIEEE Transactions on Wireless Communications, 2018
Covert communication conceals the transmission of the message from an attentive adversary. Recent work on the limits of covert communication in additive white Gaussian noise (AWGN) channels has demonstrated that a covert transmitter (Alice) can reliably transmit a maximum of $\mathcal{O}\left(\sqrt{n}\right)$ bits to a covert receiver (Bob) without ...
Ramin Soltani   +4 more
openaire   +2 more sources

Noise-adaptive Margin-based Active Learning and Lower Bounds under Tsybakov Noise Condition [PDF]

open access: yes, 2015
We present a simple noise-robust margin-based active learning algorithm to find homogeneous (passing the origin) linear separators and analyze its error convergence when labels are corrupted by noise.
Singh, Aarti, Wang, Yining
core   +1 more source

Propagation of numerical noise in particle-in-cell tracking

open access: yes, 2015
Particle-in-cell (PIC) is the most used algorithm to perform self-consistent tracking of intense charged particle beams. It is based on depositing macro-particles on a grid, and subsequently solving on it the Poisson equation.
Franchetti, Giuliano, Kesting, Frederik
core   +2 more sources

Enhancing Secure Energy Efficiency of SWIPT IoT Network Considering IRS and Artificial-Noise: A Deep Learning Approach

open access: yesIEEE Access
Internet of things (IoT) networks connect sensing devices to the Internet for tasks like tracking, monitoring, and data analysis. However, the large data generated, especially in resource-heavy services, challenges energy efficiency (EE) and security ...
Kimchheang Chhea, Jung-Ryun Lee
doaj   +1 more source

The Secrecy Capacity Optimization Artificial Noise: A New Type of Artificial Noise for Secure Communication in MIMO System

open access: yesIEEE Access, 2019
In multiple-input multiple-output wireless communication system, artificial noise (AN) is designed to be aligned into the null space of the legitimate channel so that it has no effect on the legitimate channel.
Yebo Gu   +3 more
doaj   +1 more source

Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel

open access: yes, 2010
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner. Artificial noise is introduced along with useful information.
Mo, Jianhua, Tao, Meixia, Zhu, Jingge
core   +1 more source

Home - About - Disclaimer - Privacy