Rate splitting multiple access in C-RAN: A scalable and robust design
Cloud radio access networks (C-RAN) enable a network platform for beyond the fifth
generation of communication networks (B5G), which incorporates the advances in cloud …
generation of communication networks (B5G), which incorporates the advances in cloud …
Joint precoding and artificial noise design for MU-MIMO wiretap channels
Secure precoding superimposed with artificial noise (AN) is a promising transmission
technique to improve security by harnessing the superposition nature of the wireless …
technique to improve security by harnessing the superposition nature of the wireless …
The multi-objective deployment optimization of UAV-mounted cache-enabled base stations
The deployment of unmanned aerial vehicle (UAV)-mounted base stations is emerging as
an effective solution for providing wireless communication service to ground terminals (GTs) …
an effective solution for providing wireless communication service to ground terminals (GTs) …
Resource allocation for secure wireless powered integrated multicast and unicast services with full duplex self-energy recycling
This paper investigates a secure wireless-powered integrated service system with full-
duplex self-energy recycling. Specifically, an energy-constrained information transmitter (IT) …
duplex self-energy recycling. Specifically, an energy-constrained information transmitter (IT) …
Physical layer service integration in 5G: Potentials and challenges
High transmission rate and secure communication have been identified as the key targets
that need to be effectively addressed by fifth generation wireless systems. In this context, the …
that need to be effectively addressed by fifth generation wireless systems. In this context, the …
UAV-aided secure transmission in MISOME wiretap channels with imperfect CSI
Y Chen, Z Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we study secure cooperative transmission for the multiple-input-single-output
multiple-eavesdropper (MISOME) systems, where a source (Alice) aims to send confidential …
multiple-eavesdropper (MISOME) systems, where a source (Alice) aims to send confidential …
Information Freshness Aware Wireless Multi-User Uplink Physical Layer Security Communication
In this article, we focus on a wireless multiuser uplink network consisting of a single antenna
access point (AP) and multiple single antenna users, in which each user transmits time …
access point (AP) and multiple single antenna users, in which each user transmits time …
Rate-splitting multiple access in cache-aided cloud-radio access networks
Rate-splitting multiple access (RSMA) has been recognized as a promising physical layer
strategy for 6G. Motivated by the ever-increasing popularity of cache-enabled content …
strategy for 6G. Motivated by the ever-increasing popularity of cache-enabled content …
Opportunistic scheduling for average secrecy rate enhancement in fading downlink channel with potential eavesdroppers
In this paper, we consider user scheduling and power allocation techniques for downlinks
where transmitted message must be kept confidential from all other unintended users and …
where transmitted message must be kept confidential from all other unintended users and …
Outage-constrained secrecy energy efficiency optimization for CRNs with non-linear energy harvesting
L Ni, X Da, H Hu, Y Yuan, Z Zhu, Y Pan - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate a robust transmit design in underlay energy harvesting (EH)
cognitive radio networks (CRNs), where the malicious energy receivers (ERs) can be treated …
cognitive radio networks (CRNs), where the malicious energy receivers (ERs) can be treated …