Results 41 to 50 of about 139,334 (281)

Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code

open access: yesEntropy, 2023
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu   +4 more
doaj   +1 more source

Feasibility of positive secrecy rate in wiretap interference channels [PDF]

open access: yes2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2014
Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the secrecy rate in a two-user interference network where unintended user may overhear one of the users, namely user 1.
Kalantari, Ashkan   +4 more
openaire   +2 more sources

Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks

open access: yes, 2015
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili   +5 more
core   +1 more source

Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel

open access: yes, 2010
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner. Artificial noise is introduced along with useful information.
Mo, Jianhua, Tao, Meixia, Zhu, Jingge
core   +1 more source

Secrecy Communication with Security Rate Measure

open access: yes, 2015
10 pages, submitted to IEEE ITW 2015.
Yu, Lei, Li, Houqiang, Li, Weiping
openaire   +2 more sources

Pancreas, Muscle, and Subcutaneous Fat Atrophy in Patients Undergoing Radiation for Neuroblastoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Radiation therapy (RT) is part of standard‐of‐care therapy in high‐risk neuroblastoma (HR‐NBL) but can significantly affect nearby tissue. The objectives of this study were (1) to characterize changes in pancreas volume after RT and (2) to characterize changes in body composition, including body weight percentile ...
Pradipta Debnath   +10 more
wiley   +1 more source

Long-Term Secrecy Throughput and Fairness Tradeoff for Wireless Powered Secure IoT Networks

open access: yesIEEE Open Journal of the Communications Society
This paper focuses on the interplay between secrecy throughput and fairness for a wireless powered secure Internet of Things (IoT) network, where IoT devices harvest energy from an access point (AP), and securely upload their data to the AP by exploiting
Lei Zheng   +4 more
doaj   +1 more source

Finite-Blocklength Bounds for Wiretap Channels

open access: yes, 2016
This paper investigates the maximal secrecy rate over a wiretap channel subject to reliability and secrecy constraints at a given blocklength. New achievability and converse bounds are derived, which are shown to be tighter than existing bounds.
Poor, H. Vincent   +2 more
core   +1 more source

In vitro models of cancer‐associated fibroblast heterogeneity uncover subtype‐specific effects of CRISPR perturbations

open access: yesMolecular Oncology, EarlyView.
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra   +10 more
wiley   +1 more source

Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game

open access: yesDianxin kexue, 2014
By developing the classical wire-tap channel, an approach was proposed to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered wireless sensor network.
Shigen Shen   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy