A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
Physical layer authentication and security design in the machine learning era
Security at the physical layer (PHY) is a salient research topic in wireless systems, and
machine learning (ML) is emerging as a powerful tool for providing new data-driven security …
machine learning (ML) is emerging as a powerful tool for providing new data-driven security …
Physical layer security for wireless-powered ambient backscatter cooperative communication networks
Low power consumption and high spectrum efficiency as the great challenges for multi-
device access to Internet-of-Things (IoT) have put forward stringent requirements on the …
device access to Internet-of-Things (IoT) have put forward stringent requirements on the …
Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …
are believed as supporting technologies for building a smart city. The advancement and …
Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers
This paper investigates cooperative security in wireless networks, where a source (Alice)
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …
Secure V2V communications in relay-assisted cognitive radio vehicular networks with imperfect CSI
Y Zhang, J Hou, X Zhao - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
This article considers a relay-based underlay cognitive radio vehicular network, where a
secondary source vehicle transmits information to a secondary destination vehicle with a …
secondary source vehicle transmits information to a secondary destination vehicle with a …
Secure beamforming for full-duplex MIMO two-way untrusted relay systems
This paper focuses on a full-duplex multiple-input multiple-output two-way untrusted relay
system, and investigates the optimal beamforming design of such system to maximize its …
system, and investigates the optimal beamforming design of such system to maximize its …
Cooperative secure communication in two-hop buffer-aided networks
We propose two cooperative secure transmission schemes to protect a two-hop buffer-aided
network assisted by an energy harvesting relay. In the first scheme, we assume that the …
network assisted by an energy harvesting relay. In the first scheme, we assume that the …
Secure transmission in SWIPT-powered two-way untrusted relay networks
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-
forward relay networks with simultaneous wireless information and power transfer (SWIPT) …
forward relay networks with simultaneous wireless information and power transfer (SWIPT) …
Secure and energy-efficient precoding for MIMO two-way untrusted relay systems
This paper focuses on the multiple-input-multiple-output (MIMO) two-way relay system with
an untrusted relay and investigates its secure and energy-efficient precoding design issue …
an untrusted relay and investigates its secure and energy-efficient precoding design issue …