Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
Interplay between NOMA and other emerging technologies: A survey
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to
scale up the number of users, enhance the spectral efficiency, and improve the user-fairness …
scale up the number of users, enhance the spectral efficiency, and improve the user-fairness …
Transmit antenna selection for security enhancement in MIMO wiretap channels
We propose and analyze transmit antenna selection (TAS) to enhance physical layer
security in a wiretap channel with NA antennas at the transmitter, NB antennas at the …
security in a wiretap channel with NA antennas at the transmitter, NB antennas at the …
Secure multiple amplify-and-forward relaying with cochannel interference
We investigate the impact of cochannel interference on the security performance of multiple
amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data …
amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data …
Physical layer authentication and security design in the machine learning era
TM Hoang, A Vahid, HD Tuan… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Security at the physical layer (PHY) is a salient research topic in wireless systems, and
machine learning (ML) is emerging as a powerful tool for providing new data-driven security …
machine learning (ML) is emerging as a powerful tool for providing new data-driven security …
Physical-layer security in free-space optical communications
The communication between two legitimate peers in the presence of an external
eavesdropper is studied from a physical-layer security perspective in the context of free …
eavesdropper is studied from a physical-layer security perspective in the context of free …
On the security of cognitive radio networks
Cognitive radio has emerged as an essential recipe for future high-capacity, high-coverage
multitier hierarchical networks. Securing data transmission in these networks is of the utmost …
multitier hierarchical networks. Securing data transmission in these networks is of the utmost …
Secure transmission in cell-free massive MIMO with low-resolution DACs over Rician fading channels
This paper investigates the secure transmission in downlink cell-free massive multiple-input
multiple-output (MIMO) systems in the presence of an active multi-antenna eavesdropper …
multiple-output (MIMO) systems in the presence of an active multi-antenna eavesdropper …
Physical layer security of TAS/MRC with antenna correlation
We analyze the impact of antenna correlation on secrecy performance of multiple-input
multiple-output wiretap channels where transmitter employs transmit antenna selection …
multiple-output wiretap channels where transmitter employs transmit antenna selection …