Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Joint trajectory and precoding optimization for UAV-assisted NOMA networks
The explosive data traffic and connections in 5G networks require the use of non-orthogonal
multiple access (NOMA) to accommodate more users. Unmanned aerial vehicle (UAV) can …
multiple access (NOMA) to accommodate more users. Unmanned aerial vehicle (UAV) can …
UAV-relaying-assisted secure transmission with caching
Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long
distance, which can achieve significant throughput gain owing to its mobility and line-of-sight …
distance, which can achieve significant throughput gain owing to its mobility and line-of-sight …
Transceiver design and multihop D2D for UAV IoT coverage in disasters
When natural disasters strike, the coverage for Internet of Things (IoT) may be severely
destroyed, due to the damaged communications infrastructure. Unmanned aerial vehicles …
destroyed, due to the damaged communications infrastructure. Unmanned aerial vehicles …
Joint active and passive beamforming design for the IRS-assisted MIMOME-OFDM secure communications
The effective combination of physical layer security communication and intelligent reflecting
surface (IRS) technology has recently attracted extensive attention to improve the system …
surface (IRS) technology has recently attracted extensive attention to improve the system …
Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay
In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of
cell-edge users cannot be guaranteed due to severe channel fading. On the other hand, the …
cell-edge users cannot be guaranteed due to severe channel fading. On the other hand, the …
Protecting secure communication under UAV smart attack with imperfect channel estimation
C Li, Y Xu, J **a, J Zhao - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate a secure communication system, where one transmitter sends
some confidential message to one receiver, under the smart attack from one unmanned …
some confidential message to one receiver, under the smart attack from one unmanned …
Joint beamforming and jamming optimization for secure transmission in MISO-NOMA networks
Non-orthogonal multiple access (NOMA) has been developed as a key multi-access
technique for 5G. However, secure transmission remains a challenge in NOMA. Especially …
technique for 5G. However, secure transmission remains a challenge in NOMA. Especially …
Joint positioning of flying base stations and association of users: Evolutionary-based approach
Time-varying requirements of users on communication push mobile operators to increase
density of base stations. However, the dense deployment of conventional static base …
density of base stations. However, the dense deployment of conventional static base …
Deep neural network compression technique towards efficient digital signal modulation recognition in edge device
Digital signal modulation recognition is meaningful for military application and civilian
application. In the non-cooperation communication scenario, digital signal modulation …
application. In the non-cooperation communication scenario, digital signal modulation …