Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
On the ergodic capacity of MIMO NOMA systems
Non-orthogonal multiple access (NOMA) is expected to be a promising multiple access
technique for 5G networks due to its superior spectral efficiency. In this letter, the ergodic …
technique for 5G networks due to its superior spectral efficiency. In this letter, the ergodic …
Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing
The wireless medium offers many opportunities for broadcast communications. However, it
also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …
also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …
Artificial noise assisted secure transmission under training and feedback
This paper proposes a framework for the artificial noise assisted secure transmission in
multiple-input, multiple-output, multiple antenna eavesdropper (MIMOME) wiretap channels …
multiple-input, multiple-output, multiple antenna eavesdropper (MIMOME) wiretap channels …
Impact of mobility on physical layer security over wireless fading channels
Wireless physical layer security has attracted great attention in recent years. Although
mobility is an intrinsic property of wireless networks, most of the existing works only consider …
mobility is an intrinsic property of wireless networks, most of the existing works only consider …
Large system secrecy rate analysis for SWIPT MIMO wiretap channels
In this paper, we study the multiple-input multiple-output wiretap channel for simultaneous
wireless information and power transfer, in which there is a base station (BS), an information …
wireless information and power transfer, in which there is a base station (BS), an information …
Energy efficiency optimization for fading MIMO non-orthogonal multiple access systems
Non-orthogonal multiple access (NOMA) is expected to be a promising multiple access
techniques for 5G networks due to its superior spectral efficiency (SE). In this paper, we …
techniques for 5G networks due to its superior spectral efficiency (SE). In this paper, we …
Energy efficiency of confidential multi-antenna systems with artificial noise and statistical CSI
The problem of energy-efficient resource allocation in multiple-antenna wiretap channels is
investigated, wherein a malicious user tries to eavesdrop the communication between two …
investigated, wherein a malicious user tries to eavesdrop the communication between two …
Secret key generation with cross multiplication of two-way random signals
L **, S Zhang, Y Lou, X Xu, Z Zhong - IEEE Access, 2019 - ieeexplore.ieee.org
The secret key generation rate (SKGR) of current physical layer security methods is not high
enough for practical requirements. A novel SKG method based on the cross multiplication …
enough for practical requirements. A novel SKG method based on the cross multiplication …
Cooperative jamming secure scheme for IWNs random mobile users aided by edge computing intelligent node selection
The cooperative physical layer security scheme can enhance the communication security of
industrial wireless nodes that are computing and energy limitation, which provides the …
industrial wireless nodes that are computing and energy limitation, which provides the …