A comprehensive survey on full-duplex communication: Current solutions, future trends, and open issues
Full-duplex (FD) communication is a potential game changer for future wireless networks. It
allows for simultaneous transmit and receive operations over the same frequency band, a …
allows for simultaneous transmit and receive operations over the same frequency band, a …
Physical layer security for UAV communications: A comprehensive survey
J Wang, X Wang, R Gao, C Lei, W Feng… - China …, 2022 - ieeexplore.ieee.org
Due to its high mobility and flexible deployment, unmanned aerial vehicle (UAV) is drawing
unprecedented interest in both military and civil applications to enable agile and ubiquitous …
unprecedented interest in both military and civil applications to enable agile and ubiquitous …
Secrecy and covert communications against UAV surveillance via multi-hop networks
HM Wang, Y Zhang, X Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives
rise to the confidential information leakage challenge in both civilian and military …
rise to the confidential information leakage challenge in both civilian and military …
Energy-efficient secure video streaming in UAV-enabled wireless networks: A safe-DQN approach
Unmanned aerial vehicles (UAVs) are anticipated to be integrated into the next generation
wireless networks as new aerial mobile nodes, which can provide various live streaming …
wireless networks as new aerial mobile nodes, which can provide various live streaming …
Proactive eavesdrop** via jamming over short packet suspicious communications with finite blocklength
D Xu, H Zhu - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Short packet communications play key roles in the Internet-of-Things. Conventional
Shannon's coding theorem is not applicable for short packet communications, and the …
Shannon's coding theorem is not applicable for short packet communications, and the …
Energy management and trajectory optimization for UAV-enabled legitimate monitoring systems
Thanks to their quick placement and high flexibility, unmanned aerial vehicles (UAVs) can
be very useful in the current and future wireless communication systems. With a growing …
be very useful in the current and future wireless communication systems. With a growing …
Intelligent reflecting surface-assisted proactive eavesdrop** over suspicious broadcasting communication with statistical CSI
G Hu, J Si, Y Cai, N Al-Dhahir - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
This paper studies a novel wireless surveillance scenario, where a half-duplex legitimate
monitor (E), aided by an intelligent reflecting surface (IRS), aims to eavesdrop the frequency …
monitor (E), aided by an intelligent reflecting surface (IRS), aims to eavesdrop the frequency …
Cooperative double-IRS aided proactive eavesdrop**
Proactive eavesdrop** was used recently to efficiently intercept a suspicious wireless
communication link, by jamming the suspicious destination node. However, While jamming …
communication link, by jamming the suspicious destination node. However, While jamming …
Proactive eavesdrop** via jamming in full-duplex multi-antenna systems: Beamforming design and antenna selection
This paper investigates the application of full-duplex (FD) multi-antenna transceivers in
proactive eavesdrop** systems. To this end, we jointly optimize the transmit and receive …
proactive eavesdrop** systems. To this end, we jointly optimize the transmit and receive …
Jamming-assisted proactive eavesdrop** over two suspicious communication links
This paper studies a new and challenging wireless surveillance problem where a legitimate
monitor attempts to eavesdrop two suspicious communication links simultaneously. To …
monitor attempts to eavesdrop two suspicious communication links simultaneously. To …