Results 41 to 50 of about 4,724 (196)
Jamming-Aided Secure Communication in Massive MIMO Rician Channels
In this paper, we investigate the artificial noise-aided jamming design for a transmitter equipped with large antenna array in Rician fading channels. We figure out that when the number of transmit antennas tends to infinity, whether the secrecy outage ...
Lee, Jemin +3 more
core +1 more source
On the Analysis of Secrecy Outage Probability Using Average Channel Capacity
In this article, we analyze the outage probability of physically secure wireless signal transmission in fading envi-ronments where both primary and eavesdropper channels are subject to generalized fading. We propose a novel approach using the average channel capacity of the primary channel and that of the eavesdropper channel to the outage probability ...
openaire +5 more sources
A secure access strategy for D2D (device-to-device) communications underlaying cellular networks based on the secrecy outage probability was proposed.Firstly,the secrecy outage probability in the worst case was derived and a transmission power ...
Ya-jun CHEN +3 more
doaj +2 more sources
The secrecy outage performance for a cooperative cognitive radio energy‐harvesting network is analyzed. The cognitive network is composed of an energy‐constrained cognitive source (CS), multiple energy‐constrained cognitive relays (CRs) and a cognitive ...
Yujie Zhang +3 more
doaj +1 more source
Outage Constrained Robust Secure Transmission for MISO Wiretap Channels [PDF]
In this paper we consider the robust secure beamformer design for MISO wiretap channels. Assume that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and secrecy ...
Hong, Mingyi +4 more
core
Location-Based Beamforming for Rician Wiretap Channels
We propose a location-based beamforming scheme for wiretap channels, where a source communicates with a legitimate receiver in the presence of an eavesdropper.
Liu, Chenxi, Malaney, Robert
core +1 more source
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom +2 more
wiley +1 more source
Secrecy Outage Performance Analysis for Cooperative NOMA Over Nakagami-
In this paper, we investigate the secrecy outage performance of a typical cooperative downlink non-orthogonal multiple access (NOMA) system over Nakagami-m fading channel, in which the base station transmits a superimposed signal to two users via a relay.
Chao Yu, Hak-Lim Ko, Xin Peng, Wenwu Xie
doaj +1 more source
On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav +3 more
doaj +1 more source
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming +4 more
core +1 more source

