Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the security enhancement of uplink NOMA systems with jammer selection
We investigate physical layer security of an uplink NOMA system consisting of one base
station, multiple users and one eavesdropper. During each uplink transmission, two users …
station, multiple users and one eavesdropper. During each uplink transmission, two users …
CRT-BIoV: a cognitive radio technique for blockchain-enabled internet of vehicles
Cognitive Radio Network (CRN) is considered as a viable solution on Internet of Vehicle
(IoV) where objects equipped with cognition make decisions intelligently through the …
(IoV) where objects equipped with cognition make decisions intelligently through the …
Resource allocation and trajectory design in UAV-assisted jamming wideband cognitive radio networks
The secure performance of wideband cognitive radio networks (CRNs) with OFDMA
(orthogonal frequency-division multiple access) achieved by using physical layer security is …
(orthogonal frequency-division multiple access) achieved by using physical layer security is …
Covert communications aided by cooperative jamming in overlay cognitive radio networks
This paper examines integrating jamming and secondary signals for covert communications
in cognitive radio networks (CRNs), aiming to enhance covertness by using jamming and …
in cognitive radio networks (CRNs), aiming to enhance covertness by using jamming and …
Generative adversarial network assisted power allocation for cooperative cognitive covert communication system
This letter investigates a power allocation problem for a cooperative cognitive covert
communication system, where the relay secondary transmitter (ST) covertly transmits private …
communication system, where the relay secondary transmitter (ST) covertly transmits private …
Secure Uplink Transmission Against Multi-Intelligent Eavesdroppers With Time-Domain Artificial Noise in MIMO IoT Systems
Physical-layer security (PLS) has become an intriguing technology to address
eavesdrop** issues in Internet of Things (IoT) systems owing to its low complexity and …
eavesdrop** issues in Internet of Things (IoT) systems owing to its low complexity and …
Cognitive NOMA for UAV-enabled secure communications: Joint 3D trajectory design and power allocation
N Tang, H Tang, B Li, X Yuan - IEEE Access, 2020 - ieeexplore.ieee.org
In the paper, we investigate the physical layer security (PLS) of an unmanned aerial vehicle
(UAV) enabled communication system that integrates non-orthogonal multiple access …
(UAV) enabled communication system that integrates non-orthogonal multiple access …
A secure spectrum handoff mechanism in cognitive radio networks
The need for more efficient spectrum utilization is becoming more pronounced in our
increasingly digitalized society. However, this also introduces a variety of new security …
increasingly digitalized society. However, this also introduces a variety of new security …
Approximate data aggregation in sensor equipped IoT networks
As Internet-of-Things (IoT) networks provide efficient ways to transfer data, they are used
widely in data sensing applications. These applications can further include wireless sensor …
widely in data sensing applications. These applications can further include wireless sensor …
A cross-layer cooperative jamming scheme for social internet of things
In this paper, we design a friendly jammer selection scheme for the social Internet of Things
(IoT). A typical social IoT is composed of a cellular network with underlaying Device-to …
(IoT). A typical social IoT is composed of a cellular network with underlaying Device-to …