Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

Joint trajectory and precoding optimization for UAV-assisted NOMA networks

N Zhao, X Pang, Z Li, Y Chen, F Li… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
The explosive data traffic and connections in 5G networks require the use of non-orthogonal
multiple access (NOMA) to accommodate more users. Unmanned aerial vehicle (UAV) can …

UAV-relaying-assisted secure transmission with caching

F Cheng, G Gui, N Zhao, Y Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long
distance, which can achieve significant throughput gain owing to its mobility and line-of-sight …

Transceiver design and multihop D2D for UAV IoT coverage in disasters

X Liu, Z Li, N Zhao, W Meng, G Gui… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
When natural disasters strike, the coverage for Internet of Things (IoT) may be severely
destroyed, due to the damaged communications infrastructure. Unmanned aerial vehicles …

Joint active and passive beamforming design for the IRS-assisted MIMOME-OFDM secure communications

W Jiang, B Chen, J Zhao, Z **ong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The effective combination of physical layer security communication and intelligent reflecting
surface (IRS) technology has recently attracted extensive attention to improve the system …

Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay

Y Cao, N Zhao, G Pan, Y Chen, L Fan… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In a downlink non-orthogonal multiple access (NOMA) system, the reliable transmission of
cell-edge users cannot be guaranteed due to severe channel fading. On the other hand, the …

Protecting secure communication under UAV smart attack with imperfect channel estimation

C Li, Y Xu, J **a, J Zhao - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate a secure communication system, where one transmitter sends
some confidential message to one receiver, under the smart attack from one unmanned …

Joint beamforming and jamming optimization for secure transmission in MISO-NOMA networks

N Zhao, W Wang, J Wang, Y Chen, Y Lin… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has been developed as a key multi-access
technique for 5G. However, secure transmission remains a challenge in NOMA. Especially …

Joint positioning of flying base stations and association of users: Evolutionary-based approach

J Plachy, Z Becvar, P Mach, R Marik, M Vondra - IEEE Access, 2019 - ieeexplore.ieee.org
Time-varying requirements of users on communication push mobile operators to increase
density of base stations. However, the dense deployment of conventional static base …

Deep neural network compression technique towards efficient digital signal modulation recognition in edge device

Y Tu, Y Lin - IEEE Access, 2019 - ieeexplore.ieee.org
Digital signal modulation recognition is meaningful for military application and civilian
application. In the non-cooperation communication scenario, digital signal modulation …