Results 91 to 100 of about 2,245 (194)

General adapted‐threshold monitoring in discrete environments and rules for imbalanced classes

open access: yesStatistica Neerlandica, Volume 79, Issue 1, February 2025.
Having in mind applications in statistics and machine learning such as individualized care monitoring, or watermark detection in large language models, we consider the following general setting: When monitoring a sequence of observations, Xt, there may be additional information, Zt, on the environment which should be used to design the monitoring ...
Ansgar Steland   +2 more
wiley   +1 more source

Enhancing Security of Primary User in Underlay Cognitive Radio Networks With Secondary User Selection

open access: yesIEEE Access, 2018
This paper investigates the effect of multiuser gain provided by the secondary user selection on the secrecy performance of the primary users. We first propose a simple scheme where the user with the minimal interference channel is selected, and derive a
Mian Qin   +3 more
doaj   +1 more source

On the Secrecy Capacity of Fading Channels

open access: yes, 2006
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Gamal, Hesham El   +2 more
core   +2 more sources

Transmit design for MIMO wiretap channel with a malicious jammer

open access: yes, 2016
In this paper, we consider the transmit design for multi-input multi-output (MIMO) wiretap channel including a malicious jammer. We first transform the system model into the traditional three-node wiretap channel by whitening the interference at the ...
Chen, Zhi   +3 more
core   +1 more source

Asymptotic performance analysis of untrusted relay system with full-duplex jamming destination

open access: yesTongxin xuebao, 2018
The cooperative relay technique in the field of physical layer security is widely concerned by the academic community,due to the advantages of increasing the network capacity and expanding the network coverage.However,cooperative relays may play as ...
Rui ZHAO   +4 more
doaj   +2 more sources

Secure Communication for Spatially Sparse Millimeter-Wave Massive MIMO Channels via Hybrid Precoding [PDF]

open access: yes, 2019
In this paper, we investigate secure communication over sparse millimeter-wave (mm-Wave) massive multiple-input multiple-output (MIMO) channels by exploiting the spatial sparsity of legitimate user's channel.
Ng, DWK, Swindlehurst, AL, Xu, J, Xu, W
core   +1 more source

Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels

open access: yesIEEE Access, 2017
This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical ...
Lubna Elsaid   +4 more
doaj   +1 more source

Chaos-Based Dual-Function OTFS: Joint Security and PAPR Reduction for LEO Satellite Communications

open access: yesIEEE Access
Orthogonal time frequency space (OTFS) modulation is emerging as a strong candidate for Low Earth Orbit (LEO) satellite communication systems due to its ability to counter Doppler and delay impairments, enabling reliable performance in high-mobility ...
Imran Younas, Nawaf Qasem Hamood Othman
doaj   +1 more source

Research on critical SNR and power allocation of artificial noise assisted secure transmission

open access: yesTongxin xuebao, 2019
A comprehensive performance analysis of artificial noise (AN) assisted secure transmission in multiple-input single-output (MISO) wiretap channels was presented.It was shown that the AN scheme did not always improve the security,and provided an exact ...
Hao DENG, Huiming WANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy