Results 121 to 130 of about 1,643 (150)
Some of the next articles are maybe not open access.
Secure transmission for NOMA systems with imperfect SIC
China Communications, 2020This paper investigates secure transmission for non-orthogonal multiple access (NOMA) systems where the imperfect successive interference cancellation (SIC) is considered at both legitimate users and eavesdropper (Eve).
Zhongwu Xiang +2 more
semanticscholar +1 more source
Active RIS Enabled Secure NOMA Communications With Discrete Phase Shifting
IEEE Transactions on Wireless CommunicationsActive reconfigurable intelligent surface (RIS) is deemed a prospective candidate to compensate the double fading attenuation caused by the passive RIS, where each element can reflect and amplify the received signals through its low power integrating ...
Caihong Gong +4 more
semanticscholar +1 more source
Secure Phase Shift Configuration Strategies With UAV-Mounted STAR-RIS
IEEE Internet of Things JournalThis article investigates a novel anti-eavesdropping strategy based on uncrewed aerial vehicle (UAV)-mounted simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). In particular, a UAV equipped with a STAR-RIS acts as a
Danyu Diao +6 more
semanticscholar +1 more source
Secure Transmission in Non-Orthogonal Multiple Access Networks With an Untrusted Relay
IEEE Wireless Communications Letters, 2019This letter investigates secure transmission in non-orthogonal multiple access networks with an untrusted amplify-and-forward relay. In order to enhance secrecy performance, a cooperative jamming strategy is designed to confuse the relay.
Zhongwu Xiang +4 more
semanticscholar +1 more source
Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks
IEEE Transactions on Information Forensics and Security, 2019The millimeter-wave (mmWave) ultra-dense networks are more suitable for wireless power transfer, since the short-distance transmissions experience less pathloss and the base station (BS) packed with large-scale antenna arrays can achieve significant ...
Xiaoli Sun +5 more
semanticscholar +1 more source
Secure Transmission with a Full-Duplex Relay in Power Line Communications
2024 IEEE 7th International Electrical and Energy Conference (CIEEC)With the increasingly prominent security problems of Industrial Internet and the rapid development of computing technology, the security of power line communication (PLC) based on classical encryption technology faces new challenges.
Jiarui Zhang +3 more
semanticscholar +1 more source
2024 IEEE/CIC International Conference on Communications in China (ICCC)
This paper addresses the optimum power control problem of Full-Duplex (FD) jamming and interception system under game theory framework over Rayleigh fading channels.
Songhu Ge +5 more
semanticscholar +1 more source
This paper addresses the optimum power control problem of Full-Duplex (FD) jamming and interception system under game theory framework over Rayleigh fading channels.
Songhu Ge +5 more
semanticscholar +1 more source
An Optimal/Fixed Power Allocation Schemes for Overlay CR-NOMA System with Untrusted Users
CSI International Symposium on Artificial Intelligence and Signal ProcessingIn order to resolve the security issues in 5G and future wireless networks, physical layer security (PLS) and cognitive radio (CR) technologies can be used with non-orthogonal multiple access (NOMA) to greatly improve spectrum efficiency (SE).
I. S. Priya, Suseela Vappangi
semanticscholar +1 more source
Secrecy Throughput Maximization for MISO Multi-Eavesdropper Wiretap Channels
IEEE Transactions on Information Forensics and Security, 2017Wei Wang, K. C. Teh, K. H. Li
semanticscholar +1 more source
Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system
Science China Information Sciences, 2020Yue Wu +4 more
semanticscholar +1 more source

