Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
A survey of optimization approaches for wireless physical layer security
Due to the malicious attacks in wireless networks, physical layer security has attracted
increasing concerns from both academia and industry. The research on physical layer …
increasing concerns from both academia and industry. The research on physical layer …
A survey on reconfigurable intelligent surface for physical layer security of next-generation wireless communications
Unprecedented growth in wireless data traffic, and ever-increasing demand for highly
secured, and low-latency wireless communication has motivated the research community to …
secured, and low-latency wireless communication has motivated the research community to …
Improving physical layer secrecy using full-duplex jamming receivers
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
Physical layer network security in the full-duplex relay system
This paper investigates the secrecy performance of full-duplex relay (FDR) networks. The
resulting analysis shows that FDR networks have better secrecy performance than half …
resulting analysis shows that FDR networks have better secrecy performance than half …
On securing underwater acoustic networks: A survey
S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …
untransparent or even hostile environments and face many security threats, while many …
Secrecy rate analysis of UAV-enabled mmWave networks using Matérn hardcore point processes
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as
an effective solution to provide large coverage and dynamic capacity for both military and …
an effective solution to provide large coverage and dynamic capacity for both military and …
Physical layer security with its applications in 5G networks: A review
5G network is expected to support massive user connections and exponentially increasing
wireless services, which makes network security unprecedentedly important. Unlike …
wireless services, which makes network security unprecedentedly important. Unlike …
Secure multiple amplify-and-forward relaying with cochannel interference
We investigate the impact of cochannel interference on the security performance of multiple
amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data …
amplify-and-forward (AF) relaying networks, where N intermediate AF relays assist the data …
Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations
The Internet of Things (IoT) depicts a bright future, where any devices having sensorial and
computing capabilities can interact with each other. Among all existing technologies, the …
computing capabilities can interact with each other. Among all existing technologies, the …