Results 121 to 130 of about 1,643 (150)
Some of the next articles are maybe not open access.

Secure transmission for NOMA systems with imperfect SIC

China Communications, 2020
This paper investigates secure transmission for non-orthogonal multiple access (NOMA) systems where the imperfect successive interference cancellation (SIC) is considered at both legitimate users and eavesdropper (Eve).
Zhongwu Xiang   +2 more
semanticscholar   +1 more source

Active RIS Enabled Secure NOMA Communications With Discrete Phase Shifting

IEEE Transactions on Wireless Communications
Active reconfigurable intelligent surface (RIS) is deemed a prospective candidate to compensate the double fading attenuation caused by the passive RIS, where each element can reflect and amplify the received signals through its low power integrating ...
Caihong Gong   +4 more
semanticscholar   +1 more source

Secure Phase Shift Configuration Strategies With UAV-Mounted STAR-RIS

IEEE Internet of Things Journal
This article investigates a novel anti-eavesdropping strategy based on uncrewed aerial vehicle (UAV)-mounted simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). In particular, a UAV equipped with a STAR-RIS acts as a
Danyu Diao   +6 more
semanticscholar   +1 more source

Secure Transmission in Non-Orthogonal Multiple Access Networks With an Untrusted Relay

IEEE Wireless Communications Letters, 2019
This letter investigates secure transmission in non-orthogonal multiple access networks with an untrusted amplify-and-forward relay. In order to enhance secrecy performance, a cooperative jamming strategy is designed to confuse the relay.
Zhongwu Xiang   +4 more
semanticscholar   +1 more source

Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks

IEEE Transactions on Information Forensics and Security, 2019
The millimeter-wave (mmWave) ultra-dense networks are more suitable for wireless power transfer, since the short-distance transmissions experience less pathloss and the base station (BS) packed with large-scale antenna arrays can achieve significant ...
Xiaoli Sun   +5 more
semanticscholar   +1 more source

Secure Transmission with a Full-Duplex Relay in Power Line Communications

2024 IEEE 7th International Electrical and Energy Conference (CIEEC)
With the increasingly prominent security problems of Industrial Internet and the rapid development of computing technology, the security of power line communication (PLC) based on classical encryption technology faces new challenges.
Jiarui Zhang   +3 more
semanticscholar   +1 more source

A Game-Theoretic Power Control Approach for FD Jamming and Interception System Over Rayleigh Fading Channels

2024 IEEE/CIC International Conference on Communications in China (ICCC)
This paper addresses the optimum power control problem of Full-Duplex (FD) jamming and interception system under game theory framework over Rayleigh fading channels.
Songhu Ge   +5 more
semanticscholar   +1 more source

An Optimal/Fixed Power Allocation Schemes for Overlay CR-NOMA System with Untrusted Users

CSI International Symposium on Artificial Intelligence and Signal Processing
In order to resolve the security issues in 5G and future wireless networks, physical layer security (PLS) and cognitive radio (CR) technologies can be used with non-orthogonal multiple access (NOMA) to greatly improve spectrum efficiency (SE).
I. S. Priya, Suseela Vappangi
semanticscholar   +1 more source

Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels

IEEE Transactions on Information Forensics and Security, 2017
Wei Wang, K. C. Teh, K. H. Li
semanticscholar   +1 more source

Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system

Science China Information Sciences, 2020
Yue Wu   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy