A comprehensive survey on full-duplex communication: Current solutions, future trends, and open issues

M Mohammadi, Z Mobini… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Full-duplex (FD) communication is a potential game changer for future wireless networks. It
allows for simultaneous transmit and receive operations over the same frequency band, a …

Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey

JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …

5G-advanced toward 6G: Past, present, and future

W Chen, X Lin, J Lee, A Toskala, S Sun… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
Since the start of 5G work in 3GPP in early 2016, tremendous progress has been made in
both standardization and commercial deployments. 3GPP is now entering the second phase …

A survey of physical layer security techniques for 5G wireless networks and challenges ahead

Y Wu, A Khisti, C **ao, G Caire… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Physical layer security which safeguards data confidentiality based on the information-
theoretic approaches has received significant research interest recently. The key idea …

Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities

N Wang, P Wang, A Alipour-Fanid… - IEEE internet of things …, 2019 - ieeexplore.ieee.org
The fifth generation (5G) wireless technologies serve as a key propellent to meet the
increasing demands of the future Internet of Things (IoT) networks. For wireless …

Simultaneous wireless information and power transfer (SWIPT): Recent advances and future challenges

TDP Perera, DNK Jayakody, SK Sharma… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Initial efforts on wireless power transfer (WPT) have concentrated toward long-distance
transmission and high power applications. Nonetheless, the lower achievable transmission …

Security threats and mitigation techniques in UAV communications: A comprehensive survey

GK Pandey, DS Gurjar, HH Nguyen, S Yadav - IEEE Access, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …

DC programming and DCA: thirty years of developments

HA Le Thi, T Pham Dinh - Mathematical Programming, 2018 - Springer
The year 2015 marks the 30th birthday of DC (Difference of Convex functions) programming
and DCA (DC Algorithms) which constitute the backbone of nonconvex programming and …

Interference management in 5G and beyond network: Requirements, challenges and future directions

MUA Siddiqui, F Qamar, F Ahmed, QN Nguyen… - IEEE …, 2021 - ieeexplore.ieee.org
In the modern technological world, wireless communication has taken a massive leap from
the conventional communication system to a new radio communication network. The novel …

Achieving covert wireless communications using a full-duplex receiver

K Shahzad, X Zhou, S Yan, J Hu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Covert communications hide the transmission of a message from a watchful adversary while
ensuring a certain decoding performance at the receiver. In this paper, a wireless …