Results 51 to 60 of about 560,014 (299)
This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by ...
Han, Zhu +4 more
core +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
Towards Secure and Energy-Efficient CRNs Via Embracing Interference: A Stochastic Geometry Approach
In a cognitive radio network (CRN), the interference caused by secondary users (SUs) is conventionally regarded as an obstacle to the throughput of the primary network. However, when considering security, the interference brings potential benefits to the
Xiaoying Liu +4 more
doaj +1 more source
We enhance the physical-layer security (PLS) of amplify-and-forward relaying networks with the aid of joint relay and jammer selection (JRJS), despite the deliterious effect of channel state information (CSI) feedback delays.
Cai, Yueming +4 more
core +1 more source
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source
Comparative analysis of chloroplast genomes from 14 genera of Thymelaeaceae revealed variation in gene content, ranging from 128 to 142 genes, primarily influenced by IR expansion/contraction events and pseudogenization of ndhF, ndhI, and ndhG. Two large inversions were detected within the large single‐copy region, including a synapomorphic inversion ...
Abdullah +8 more
wiley +1 more source
Cooperative Secure Transmission in the Presence of Untrusted Relay
Considering a nonregenerative untrusted relay network, we investigate three different secure transmission strategies, for example, noncooperative strategy, conventional amplify-and-forward (AF) strategy, and cooperative jamming (CJ) strategy.
Dechuan Chen +4 more
doaj +1 more source
This paper addresses the establishment of secure communication links between Alice and Bob in the presence of an eavesdropper (Eve). The proposed scenario assumes: 1) MIMOME wiretap channel; 2) transmit antenna selection at the Alice; 3) no channel state
Hirley Alves +4 more
doaj +1 more source
In this paper, the physical layer security (PLS) analysis for a decode-and-forward (DF) protocol based multi-hop hybrid radio frequency (RF)/ free space optics (FSO) is presented.
Dipti R. Pattanayak +4 more
doaj +1 more source
On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks
This paper studies the throughput of large-scale decentralized wireless networks with physical layer security constraints. In particular, we are interested in the question of how much throughput needs to be sacrificed for achieving a certain level of ...
Andrews, Jeffrey G. +3 more
core +1 more source

