Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Covert communications: A comprehensive survey
Information security has always been a critical issue in wireless networks. Apart from other
secure techniques, covert communication emerges as a potential solution to security for …
secure techniques, covert communication emerges as a potential solution to security for …
[HTML][HTML] Green UAV communications for 6G: A survey
Abstract Unmanned Aerial Vehicles (UAVs) have received a wide range of attention for
military and commercial applications. Enhanced with communication capability, UAVs are …
military and commercial applications. Enhanced with communication capability, UAVs are …
Exploiting multi-layer refracting RIS-assisted receiver for HAP-SWIPT networks
Aiming to circumvent the severe large-scale fading and the energy scarcity dilemma in high-
altitude platform (HAP) networks, this paper investigates the benefits of the reconfigurable …
altitude platform (HAP) networks, this paper investigates the benefits of the reconfigurable …
Safeguarding next-generation multiple access using physical layer security techniques: A tutorial
Driven by the ever-increasing requirements of ultrahigh spectral efficiency, ultralow latency,
and massive connectivity, the forefront of wireless research calls for the design of advanced …
and massive connectivity, the forefront of wireless research calls for the design of advanced …
SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication
Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …
Security threats and mitigation techniques in UAV communications: A comprehensive survey
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …
applications and services, including military and rescue operations, aerial surveillance …
UAV-assisted MEC networks with aerial and ground cooperation
With the high altitude and flexible mobility, unmanned aerial vehicle (UAV) assisted mobile
edge computing (MEC) is becoming a promising technology to cope with the computation …
edge computing (MEC) is becoming a promising technology to cope with the computation …
Stochastic optimization-aided energy-efficient information collection in internet of underwater things networks
In the face of deeply exploring and exploiting marine resources, the Internet of Underwater
Things (IoUT) networks have drawn great attention considering its widely distributed low …
Things (IoUT) networks have drawn great attention considering its widely distributed low …
Enhancing physical-layer security for IoT with nonorthogonal multiple access assisted semi-grant-free transmission
Nonorthogonal multiple access (NOMA) assisted semi-grant-free transmission admits grant-
free users to access the channels otherwise solely occupied by grant-based users, and has …
free users to access the channels otherwise solely occupied by grant-based users, and has …
Beamforming and jamming optimization for IRS-aided secure NOMA networks
The integration of intelligent reflecting surface (IRS) and multiple access provides a
promising solution to improved coverage and massive connections at low cost. However …
promising solution to improved coverage and massive connections at low cost. However …