Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
Nonorthogonal multiple access for 5G and beyond
Driven by the rapid escalation of the wireless capacity requirements imposed by advanced
multimedia applications (eg, ultrahigh-definition video, virtual reality, etc.), as well as the …
multimedia applications (eg, ultrahigh-definition video, virtual reality, etc.), as well as the …
Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks
This paper investigates the physical layer security of non-orthogonal multiple access
(NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and …
(NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and …
A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
Physical layer security in cognitive radio inspired NOMA network
Z **ang, W Yang, G Pan, Y Cai… - IEEE Journal of Selected …, 2019 - ieeexplore.ieee.org
This paper investigates physical layer security (PLS) in cognitive radio inspired non-
orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary …
orthogonal multiple access (CR-NOMA) networks with multiple primary and secondary …
Secure multiple amplify-and-forward relaying over correlated fading channels
This paper quantifies the impact of correlated fading on secure communication of multiple
amplify-and-forward (AF) relaying networks. In such a network, the base station (BS) is …
amplify-and-forward (AF) relaying networks. In such a network, the base station (BS) is …
Physical layer security for 5G non-orthogonal multiple access in large-scale networks
In this paper, the physical layer security of applying non-orthogonal multiple access (NOMA)
in large-scale networks is investigated. In the considered scenario, both the NOMA users …
in large-scale networks is investigated. In the considered scenario, both the NOMA users …
Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- Channels
This paper considers a multiple-input-multiple-output (MIMO) cognitive wiretap system over
Nakagami-m channels with generalized selection combining (GSC), where confidential …
Nakagami-m channels with generalized selection combining (GSC), where confidential …