Results 231 to 240 of about 54,785 (276)
Álvaro G. S. Correia +2 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay
2022 International Conference on Networking and Network Applications (NaNA), 2022In this paper, we investigate a fundamental issue of power control to provide secrecy transmission for a dual-hop satellite communication system consisting of a terrestrial station as the source, a terrestrial station as the destination, a satellite ...
Yeqiu Xiao +4 more
openaire +2 more sources
Effective Secrecy Throughput Maximization for WPT Enabled IoT in the FBL Regime
2024 10th International Conference on Computer and Communications (ICCC)The inherent broadcast nature of wireless communication makes data transmissions vulnerable to eavesdropping, creating a critical need to balance communication reliability with security.
Ning Guo +5 more
openaire +2 more sources
IEEE Transactions on Vehicular Technology, 2022
We analyze the secrecy performance of a wireless system with limited feedback, where the channel state information (CSI) is imperfectly known at a multi-antenna source.
Tong Wu, Yulong Zou, Yuhan Jiang
semanticscholar +1 more source
We analyze the secrecy performance of a wireless system with limited feedback, where the channel state information (CSI) is imperfectly known at a multi-antenna source.
Tong Wu, Yulong Zou, Yuhan Jiang
semanticscholar +1 more source
2021
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes
Ibrahim, Md. +4 more
openaire +1 more source
The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes
Ibrahim, Md. +4 more
openaire +1 more source
Secrecy Analysis of Control Information for UAV
IEEE Transactions on Vehicular Technology, 2023In this correspondence, we investigate the average achievable secrecy rate (AASR) and average effective secrecy throughput (AEST) of the control link from the ground control station to the unmanned aerial vehicle (UAV), which requires ultra-reliable and ...
Huabing Lu +4 more
semanticscholar +1 more source
Secrecy Outage Performance of FD-NOMA Relay System With Multiple Non-Colluding Eavesdroppers
IEEE Transactions on Vehicular Technology, 2021In this paper, we investigate the secrecy performance of a full-duplex (FD) non-orthogonal multiple access (NOMA) relay system under the presence of multiple non-colluding eavesdroppers over Rayleigh fading channels.
T. Hoang +4 more
semanticscholar +1 more source
Secrecy Performance Analysis of UAV-Based Relay Communications with SWIPT
International Conference on Speech Technology and Human-Computer Dialogue, 2022In this paper, we study the secure transmission of unmanned aerial vehicle (UAV) simultaneous wireless information and power transfer (SWIPT) wireless communication.
Danyu Diao +4 more
semanticscholar +1 more source
Secrecy Performance for Full-Duplex Jamming-Aided Uplink NOMA System
IEEE Transactions on Vehicular Technology, 2021Full duplex (FD) is one of the most attractive technologies in enhancing spectral efficiency for potentially doubling the system throughput. In this work, we employ FD jamming to improve the secrecy performance of an uplink non-orthogonal multiple access
Kaiwei Jiang, Haiping Wang
semanticscholar +1 more source
Secrecy Analysis for NOMA networks With a Full-Duplex Jamming Relay
IEEE Wireless Communications and Networking Conference, 2021Non-orthogonal multiple access (NOMA) is an important technology for the forthcoming 5G and beyond. However, its privacy often suffers from adversarial eavesdropping, especially for the users with higher transmit power.
Dongdong Li +6 more
semanticscholar +1 more source

