A survey of privacy-preserving offloading methods in mobile-edge computing
T Li, X He, S Jiang, J Liu - Journal of Network and Computer Applications, 2022 - Elsevier
By moving computing resources to the network logical edge, mobile edge computing is
promising for providing low-latency computing services to mobile users, and task offloading …
promising for providing low-latency computing services to mobile users, and task offloading …
Physical layer security for UAV communications: A comprehensive survey
J Wang, X Wang, R Gao, C Lei, W Feng… - China …, 2022 - ieeexplore.ieee.org
Due to its high mobility and flexible deployment, unmanned aerial vehicle (UAV) is drawing
unprecedented interest in both military and civil applications to enable agile and ubiquitous …
unprecedented interest in both military and civil applications to enable agile and ubiquitous …
Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities
This article studies the physical layer security in a multiple-input-multiple-output (MIMO) dual-
functional radar-communication (DFRC) system, which communicates with downlink cellular …
functional radar-communication (DFRC) system, which communicates with downlink cellular …
Improving physical layer secrecy using full-duplex jamming receivers
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
Improving physical layer security via a UAV friendly jammer for unknown eavesdropper location
In this correspondence paper, we consider an unmanned aerial vehicle (UAV) equipped
with an air-to-ground friendly jammer assisting secure communications between a legitimate …
with an air-to-ground friendly jammer assisting secure communications between a legitimate …
An overview of physical layer security in wireless communication systems with CSIT uncertainty
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …
imperfections, such as noise and fading, into a source of security. This is established …
[LIVRE][B] Millets and millet technology
Globalization and industrialization of agriculture although benefitted with adequate food
supplies, its negative side effects have also been realized particularly with respect to loss of …
supplies, its negative side effects have also been realized particularly with respect to loss of …
Enhancing secrecy with multiantenna transmission in millimeter wave vehicular communication systems
Millimeter wave (mmWave) vehicular communication systems will provide an abundance of
bandwidth for the exchange of raw sensor data and support driver-assisted and safety …
bandwidth for the exchange of raw sensor data and support driver-assisted and safety …
Low-complexity joint power allocation and trajectory design for UAV-enabled secure communications with power splitting
An unmanned aerial vehicle (UAV)-aided secure communication system is conceived and
investigated, where the UAV transmits legitimate information to a ground user in the …
investigated, where the UAV transmits legitimate information to a ground user in the …
Physical-layer assisted secure offloading in mobile-edge computing
The wireless offloading feature of the recently advocated mobile-edge computing (MEC)
imposes a risk of disclosing private user data to eavesdroppers. Physical-layer security …
imposes a risk of disclosing private user data to eavesdroppers. Physical-layer security …