Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
Towards secure 5G networks: A Survey
S Zhang, Y Wang, W Zhou - Computer Networks, 2019 - Elsevier
To support various new use cases from vertical industries besides enhanced mobile
broadband communication services, the 5G system aims to provide higher speed, lower …
broadband communication services, the 5G system aims to provide higher speed, lower …
A survey on green communication and security challenges in 5G wireless communication networks
The 5G wireless cellular networks are evolving, to meet the drastic subscriber demands in
near future. This is accompanied with a rise in the energy consumption in cellular networks …
near future. This is accompanied with a rise in the energy consumption in cellular networks …
Beamforming techniques for nonorthogonal multiple access in 5G cellular networks
In this paper, we develop various beamforming techniques for downlink transmission for
multiple-input single-output nonorthogonal multiple access (NOMA) systems. First, a …
multiple-input single-output nonorthogonal multiple access (NOMA) systems. First, a …
Realizing efficient security and privacy in IoT networks
JH Anajemba, Y Tang, C Iwendi, A Ohwoekevwo… - Sensors, 2020 - mdpi.com
In recent times, security and privacy at the physical (PHY) layer has been a major issue of
several communication technologies which comprise the internet of things (IoT) and mostly …
several communication technologies which comprise the internet of things (IoT) and mostly …
5G device-to-device communication security and multipath routing solutions
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …
throughput, enhance the coverage, and reduce the power consumption of cellular …
Optimization-based access assignment scheme for physical-layer security in D2D communications underlaying a cellular network
L Wang, J Liu, M Chen, G Gui… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we consider physical-layer security for device-to-device (D2D)
communications underlaying cellular networks in which cellular users are under threat from …
communications underlaying cellular networks in which cellular users are under threat from …
Energy efficiency optimization for secure transmission in MISO cognitive radio network with energy harvesting
In this paper, we investigate different secrecy energy efficiency (SEE) optimization problems
in a multiple-input single-output underlay cognitive radio (CR) network in the presence of an …
in a multiple-input single-output underlay cognitive radio (CR) network in the presence of an …
Outage constrained robust secrecy energy efficiency maximization for EH cognitive radio networks
L Ni, X Da, H Hu, M Zhang… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
In this letter, we investigate the outage-constrained robust secure design in a multiple-input
single-output (MISO) energy harvesting (EH) cognitive radio network (CRN), where the …
single-output (MISO) energy harvesting (EH) cognitive radio network (CRN), where the …