Quantum repeaters: From quantum networks to the quantum internet
A quantum internet is the holy grail of quantum information processing, enabling the
deployment of a broad range of quantum technologies and protocols on a global scale …
deployment of a broad range of quantum technologies and protocols on a global scale …
A primer on rate-splitting multiple access: Tutorial, myths, and frequently asked questions
Rate-Splitting Multiple Access (RSMA) has emerged as a powerful multiple access,
interference management, and multi-user strategy for next generation communication …
interference management, and multi-user strategy for next generation communication …
Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Physical layer security (PLS) has emerged as a new concept and powerful alternative that
can complement and may even replace encryption-based approaches, which entail many …
can complement and may even replace encryption-based approaches, which entail many …
Secure transmission scheme based on joint radar and communication in mobile vehicular networks
Vehicle-to-vehicle (V2V) communication applications face significant challenges to security
and privacy since all types of possible breaches are common in connected and autonomous …
and privacy since all types of possible breaches are common in connected and autonomous …
Jamming and eavesdrop** defense scheme based on deep reinforcement learning in autonomous vehicle networks
As a legacy from conventional wireless services, illegal eavesdrop** is regarded as one
of the critical security challenges in Connected and Autonomous Vehicles (CAVs) network …
of the critical security challenges in Connected and Autonomous Vehicles (CAVs) network …
Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks
This paper investigates the physical layer security of non-orthogonal multiple access
(NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and …
(NOMA) in large-scale networks with invoking stochastic geometry. Both single-antenna and …
Physical layer security of cognitive ambient backscatter communications for green Internet-of-Things
The future sixth generation (6G) wireless communication networks will face the challenges
of large-scale connections green communication. To meet these requirements, cognitive …
of large-scale connections green communication. To meet these requirements, cognitive …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
On the secrecy design of STAR-RIS assisted uplink NOMA networks
This paper investigates the secure transmission in a simultaneously transmitting and
reflecting reconfigurable intelligent surface (STAR-RIS) assisted uplink non-orthogonal …
reflecting reconfigurable intelligent surface (STAR-RIS) assisted uplink non-orthogonal …