Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Covert surveillance via proactive eavesdrop** under channel uncertainty
Z Cheng, J Si, Z Li, L Guan, Y Zhao… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Surveillance performance is studied for a wireless eavesdrop** system, where a full-
duplex legitimate monitor eavesdrops a suspicious user's link with artificial noise (AN) …
duplex legitimate monitor eavesdrops a suspicious user's link with artificial noise (AN) …
Delay-aware secure transmission in MEC-enabled multicast network
This paper studies the joint precoding design and computation offloading in a mobile-edge-
computing-enabled (MEC-enabled) multicast communication network. Physical layer …
computing-enabled (MEC-enabled) multicast communication network. Physical layer …
Channel-aware key generation under wireless fading environment
This letter studies a channel-aware source-channel (CASC) key generation approach.
Specifically, when the estimated legitimate channel is in good condition, the existing …
Specifically, when the estimated legitimate channel is in good condition, the existing …