Results 41 to 50 of about 139,334 (281)
Information Leakage Rate of Optical Code Division Multiple Access Network Using Wiretap Code
Secrecy capacity is usually employed as the performance metric of the physical layer security in fiber-optic wiretap channels. However, secrecy capacity can only qualitatively evaluate the physical layer security, and it cannot quantitatively evaluate ...
Rongwo Xu +4 more
doaj +1 more source
Feasibility of positive secrecy rate in wiretap interference channels [PDF]
Interference usually is an adverse phenomenon in wireless networks. However, the interference can potentially be used to boost the secrecy rate in wireless interference channels. This work studies the secrecy rate in a two-user interference network where unintended user may overhear one of the users, namely user 1.
Kalantari, Ashkan +4 more
openaire +2 more sources
Joint Power Splitting and Secure Beamforming Design in the Wireless-powered Untrusted Relay Networks
In this work, we maximize the secrecy rate of the wireless-powered untrusted relay network by jointly designing power splitting (PS) ratio and relay beamforming with the proposed global optimal algorithm (GOA) and local optimal algorithm (LOA). Different
Feng, Suili +5 more
core +1 more source
Cooperative Secret Communication with Artificial Noise in Symmetric Interference Channel
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy rates in a cooperative manner. Artificial noise is introduced along with useful information.
Mo, Jianhua, Tao, Meixia, Zhu, Jingge
core +1 more source
Secrecy Communication with Security Rate Measure
10 pages, submitted to IEEE ITW 2015.
Yu, Lei, Li, Houqiang, Li, Weiping
openaire +2 more sources
Pancreas, Muscle, and Subcutaneous Fat Atrophy in Patients Undergoing Radiation for Neuroblastoma
ABSTRACT Background/Objectives Radiation therapy (RT) is part of standard‐of‐care therapy in high‐risk neuroblastoma (HR‐NBL) but can significantly affect nearby tissue. The objectives of this study were (1) to characterize changes in pancreas volume after RT and (2) to characterize changes in body composition, including body weight percentile ...
Pradipta Debnath +10 more
wiley +1 more source
Long-Term Secrecy Throughput and Fairness Tradeoff for Wireless Powered Secure IoT Networks
This paper focuses on the interplay between secrecy throughput and fairness for a wireless powered secure Internet of Things (IoT) network, where IoT devices harvest energy from an access point (AP), and securely upload their data to the AP by exploiting
Lei Zheng +4 more
doaj +1 more source
Finite-Blocklength Bounds for Wiretap Channels
This paper investigates the maximal secrecy rate over a wiretap channel subject to reliability and secrecy constraints at a given blocklength. New achievability and converse bounds are derived, which are shown to be tighter than existing bounds.
Poor, H. Vincent +2 more
core +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game
By developing the classical wire-tap channel, an approach was proposed to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered wireless sensor network.
Shigen Shen +5 more
doaj +2 more sources

