A survey of privacy-preserving offloading methods in mobile-edge computing

T Li, X He, S Jiang, J Liu - Journal of Network and Computer Applications, 2022 - Elsevier
By moving computing resources to the network logical edge, mobile edge computing is
promising for providing low-latency computing services to mobile users, and task offloading …

Physical layer security for UAV communications: A comprehensive survey

J Wang, X Wang, R Gao, C Lei, W Feng… - China …, 2022 - ieeexplore.ieee.org
Due to its high mobility and flexible deployment, unmanned aerial vehicle (UAV) is drawing
unprecedented interest in both military and civil applications to enable agile and ubiquitous …

Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities

N Su, F Liu, C Masouros - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
This article studies the physical layer security in a multiple-input-multiple-output (MIMO) dual-
functional radar-communication (DFRC) system, which communicates with downlink cellular …

Improving physical layer secrecy using full-duplex jamming receivers

G Zheng, I Krikidis, J Li, AP Petropulu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …

Improving physical layer security via a UAV friendly jammer for unknown eavesdropper location

Y Zhou, PL Yeoh, H Chen, Y Li… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
In this correspondence paper, we consider an unmanned aerial vehicle (UAV) equipped
with an air-to-ground friendly jammer assisting secure communications between a legitimate …

An overview of physical layer security in wireless communication systems with CSIT uncertainty

A Hyadi, Z Rezki, MS Alouini - IEEE Access, 2016 - ieeexplore.ieee.org
The concept of physical layer security builds on the pivotal idea of turning the channel's
imperfections, such as noise and fading, into a source of security. This is established …

[LIVRE][B] Millets and millet technology

A Kumar, MK Tripathi, D Joshi, V Kumar - 2021 - Springer
Globalization and industrialization of agriculture although benefitted with adequate food
supplies, its negative side effects have also been realized particularly with respect to loss of …

Enhancing secrecy with multiantenna transmission in millimeter wave vehicular communication systems

ME Eltayeb, J Choi, TY Al-Naffouri… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Millimeter wave (mmWave) vehicular communication systems will provide an abundance of
bandwidth for the exchange of raw sensor data and support driver-assisted and safety …

Low-complexity joint power allocation and trajectory design for UAV-enabled secure communications with power splitting

K Xu, MM Zhao, Y Cai, L Hanzo - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
An unmanned aerial vehicle (UAV)-aided secure communication system is conceived and
investigated, where the UAV transmits legitimate information to a ground user in the …

Physical-layer assisted secure offloading in mobile-edge computing

X He, R **, H Dai - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
The wireless offloading feature of the recently advocated mobile-edge computing (MEC)
imposes a risk of disclosing private user data to eavesdroppers. Physical-layer security …