Results 81 to 90 of about 4,682 (204)
Physical Layer Security of WPCNs With Imperfect CSI and Full-Duplex Receiver Aided Jamming
In this paper, we investigate the secrecy performance of wireless powered communication networks (WPCNs) faced by multiple passive eavesdroppers, where the full-duplex (FD) receiver utilizes the harvested energy to send the artificial jamming for ...
Mu Li +4 more
doaj +1 more source
Secrecy Outage Analysis Over Fluctuating Two-Ray Fading Channels
In this letter, we analyze the secrecy outage probability (SOP) over fluctuating two-ray fading channels but with a different definition from the one adopted in [5].
Alouini, Mohamed-Slim +3 more
core +1 more source
Blame and Cost: Understanding Responsibility Attribution and Financial Risk in AI Usage
ABSTRACT This study examines public perceptions of responsibility and potential damage associated with AI usage across various scenarios, and estimates the financial impact on firms. The survey‐based analyses of AI failures evaluating hypothetical risk scenarios and their economic consequences reveal that sociodemographic determinants shape the ...
Dorian Fildor +2 more
wiley +1 more source
The rapid proliferation of independently-designed and -deployed wireless sensor networks extremely crowds the wireless spectrum and promotes the emergence of cognitive radio sensor networks (CRSN).
Dawei Wang +4 more
doaj +1 more source
On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks
This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of ...
Andrews, Jeffrey G. +3 more
core +1 more source
ABSTRACT Flood forecasting has undergone significant development over the past two decades, with researchers exploring a range of innovative approaches to quantify both the hazards and risks associated with flood events across a range of magnitudes and frequencies.
Amirali Davary +3 more
wiley +1 more source
On the Secrecy Performance of Land Mobile Satellite Communication Systems
In this paper, we investigate the secrecy performance against eavesdropping of a land mobile satellite (LMS) system, where the satellite employs the spot beam technique, and both the terrestrial user and eavesdropper are equipped with multiple antennas ...
Kang An +3 more
doaj +1 more source
Secrecy Wireless Information and Power Transfer in Fading Wiretap Channel
Simultaneous wireless information and power transfer (SWIPT) has recently drawn significant interests for its dual use of radio signals to provide wireless data and energy access at the same time. However, a challenging secrecy communication issue arises
Liu, Liang, Xing, Hong, Zhang, Rui
core +1 more source
ABSTRACT Worldwide, cities rely on the proper functioning of critical infrastructures (CIs) such as electricity, telecommunication, water supply and transportation. Failure of those infrastructures can lead to significant and long‐lasting impacts, even far beyond the flooded areas due to cascading effects.
Andreas Burzel +2 more
wiley +1 more source
Zero-Outage Secrecy in Short Packet IoT-Aided Cellular Cooperative Network With EH-NOMA
The zero-outage secrecy with energy harvesting is considered in short packet IoT-aided cellular cooperative networks using the inspired non-orthogonal multiple access (NOMA) strategy.
Hien Quang Ta +3 more
doaj +1 more source

