Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
JM Hamamreh, HM Furqan… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
Intelligent reflecting surface: A programmable wireless environment for physical layer security
In this paper, we introduce an intelligent reflecting surface (IRS) to provide a programmable
wireless environment for physical layer security. By adjusting the reflecting coefficients, the …
wireless environment for physical layer security. By adjusting the reflecting coefficients, the …
Enabling secure wireless communications via intelligent reflecting surfaces
In this paper, we propose to utilize intelligent reflecting surfaces (IRSs) for enhancing the
physical layer security of wireless communications systems. In particular, an IRS-assisted …
physical layer security of wireless communications systems. In particular, an IRS-assisted …
Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
Improving wireless physical layer security via cooperating relays
Physical (PHY) layer security approaches for wireless communications can prevent
eavesdrop** without upper layer data encryption. However, they are hampered by …
eavesdrop** without upper layer data encryption. However, they are hampered by …
Secure transmission with multiple antennas—Part II: The MIMOME wiretap channel
A Khisti, GW Wornell - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple
antennas at the sender, intended receiver and eavesdropper. The associated channel …
antennas at the sender, intended receiver and eavesdropper. The associated channel …
Secrecy wireless information and power transfer with MISO beamforming
The dual use of radio signal for simultaneous wireless information and power transfer
(SWIPT) has recently drawn significant attention. To meet the practical requirement that the …
(SWIPT) has recently drawn significant attention. To meet the practical requirement that the …
Improving physical layer secrecy using full-duplex jamming receivers
This paper studies secrecy rate optimization in a wireless network with a single-antenna
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
source, a multi-antenna destination and a multi-antenna eavesdropper. This is an …
The secrecy capacity of the MIMO wiretap channel
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the
transmitter sends some confidential information to one user which is a legitimate receiver …
transmitter sends some confidential information to one user which is a legitimate receiver …