Results 91 to 100 of about 139,334 (281)
Some New Results on the Multiple-AccessWiretap Channel
In this paper, some new results on the multiple-access wiretap channel (MAC-WT) are provided. Specifically, first, we investigate the degraded MAC-WT, where two users transmit their corresponding confidential messages (no common message) to a legitimate ...
Bin Dai, Zheng Ma
doaj +1 more source
Cooperation with an Untrusted Relay: A Secrecy Perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help.
He, Xiang, Yener, Aylin
core +2 more sources
Neuropsychiatric Symptoms Mimicking Dementia in a Patient Treated With Imatinib
ABSTRACT Tyrosine kinase inhibitors are the cornerstone of chronic myeloid leukemia treatment. Newer agents have more potency and a broader spectrum of action, but also a higher potential for neuropsychiatric side effects. We present a case of a patient on imatinib who developed progressive cognitive, mood, and behavioral alterations.
Ashley Jones +3 more
wiley +1 more source
On the Optimality of Secret Key Agreement via Omniscience
For the multiterminal secret key agreement problem under a private source model, it is known that the maximum key rate, i.e., the secrecy capacity, can be achieved through communication for omniscience, but the omniscience strategy can be strictly ...
Chan, Chung +3 more
core +1 more source
Predicting Loss of Ambulation in Limb Girdle Muscular Dystrophy R9
ABSTRACT Background Limb girdle muscular dystrophy type R9 (LGMDR9) results from biallelic variants in FKRP. There is limited data to predict loss of ambulation (LOA) among those with LGMDR9. Methods Participants in an ongoing dystroglycanopathy natural history study (NCT00313677) with FKRP variants who had achieved ambulation and were more than 3 ...
Chandra L. Miller +6 more
wiley +1 more source
Transmitter Optimization in MISO Broadcast Channel with Common and Secret Messages
In this paper, we consider transmitter optimization in multiple-input single-output (MISO) broadcast channel with common and secret messages. The secret message is intended for $K$ users and it is transmitted with perfect secrecy with respect to $J ...
Chockalingam, A., Vishwakarma, Sanjay
core +1 more source
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu +14 more
wiley +1 more source
Secure D2D underlaying cellular communication based on artificial noise assisted
A secure communication scheme based on artificial noise assisted from base station(BS)was proposed to improve the system secrecy rate of the D2D underlaying cellular.Firstly,the system secrecy rate was modeled.Then the BS with multi-antennas added ...
Xiao-lei KANG +2 more
doaj +2 more sources
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the ...
Tekin, Ender, Yener, Aylin
core +3 more sources
On multiuser secrecy rate in flat fading channel
We consider a physical layer security based on the wiretap channel for wireless communication systems in which there are one transmitter and multiple receivers/users who report their channel state information (CSI) to the transmitter. This scenario is practically useful since it models the forward link of cellular systems where the systems can take ...
Hyoungsuk Jeon +4 more
openaire +3 more sources

