Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Safeguarding next-generation multiple access using physical layer security techniques: A tutorial
Driven by the ever-increasing requirements of ultrahigh spectral efficiency, ultralow latency,
and massive connectivity, the forefront of wireless research calls for the design of advanced …
and massive connectivity, the forefront of wireless research calls for the design of advanced …
Covertness and timeliness of data collection in UAV-aided wireless-powered IoT
In this work, we aim to maximize the timeliness of data collection subject to a covertness
constraint in unmanned aerial vehicle (UAV)-aided Internet of Things (IoT) networks, where …
constraint in unmanned aerial vehicle (UAV)-aided Internet of Things (IoT) networks, where …
Covert ambient backscatter communications with multi-antenna tag
J Liu, J Yu, D Niyato, R Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper presents a unicast beamforming network for covert ambient backscatter
communications (AmBC). Different from the prior covert backscatter works using artificial …
communications (AmBC). Different from the prior covert backscatter works using artificial …
Energy-efficient covert communications for bistatic backscatter systems
In this paper, we consider covert communications for bistatic backscatter systems, where a
tag transmits information passively to a reader by reflecting incident carrier signals with …
tag transmits information passively to a reader by reflecting incident carrier signals with …
UAV-enabled covert wireless data collection
This work considers unmanned aerial vehicle (UAV) networks for collecting data covertly
from ground users. The full-duplex (FD) UAV intends to gather critical information from a …
from ground users. The full-duplex (FD) UAV intends to gather critical information from a …
Covert communication in ambient backscatter systems with uncontrollable RF source
J Liu, J Yu, X Chen, R Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this work, we study the covert communications in ambient backscatter systems (ABS) with
uncontrollable RF source on AWGN channels. In contrast to the prior works impractically …
uncontrollable RF source on AWGN channels. In contrast to the prior works impractically …
On resource allocation in covert wireless communication with channel estimation
This work, for the first time, tackles channel estimation design with pilots in the context of
covert wireless communication. We consider Rayleigh fading for the communication channel …
covert wireless communication. We consider Rayleigh fading for the communication channel …
Covert communication with uninformed backscatters in hybrid active/passive wireless networks: Modeling and performance analysis
In this paper, we propose a new framework for covert communication in hybrid
active/passive networks, which explores the inherent uncertainty of the backscatter …
active/passive networks, which explores the inherent uncertainty of the backscatter …
On the limits of covert ambient backscatter communications
W Chen, H Ding, S Wang… - IEEE Wireless …, 2021 - ieeexplore.ieee.org
This letter investigates the limit covert rate of ambient backscatter communications over
additive white Gaussian noise channel, where Alice expects to reliably transmit information …
additive white Gaussian noise channel, where Alice expects to reliably transmit information …
Secure wirelessly powered networks at the physical layer: Challenges, countermeasures, and road ahead
Harvesting wireless power to energize miniature devices has been envisioned as a
promising solution to sustain future-generation energy-sensitive networks, eg, Internet-of …
promising solution to sustain future-generation energy-sensitive networks, eg, Internet-of …