A new frontier for IoT security emerging from three decades of key generation relying on wireless channels
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …
everyday life by connecting everyone and everything together. The massive number of …
A comprehensive survey on full-duplex communication: Current solutions, future trends, and open issues
Full-duplex (FD) communication is a potential game changer for future wireless networks. It
allows for simultaneous transmit and receive operations over the same frequency band, a …
allows for simultaneous transmit and receive operations over the same frequency band, a …
Life prediction of lithium-ion batteries based on stacked denoising autoencoders
Accurate life prediction of lithium-ion batteries is important to help assess battery quality in
advance, improve long-term battery planning, and subsequently guarantee the safety and …
advance, improve long-term battery planning, and subsequently guarantee the safety and …
Secure dual-functional radar-communication transmission: Exploiting interference for resilience against target eavesdrop**
We study security solutions for dual-functional radar communication (DFRC) systems, which
detect the radar target and communicate with downlink cellular users in millimeter-wave …
detect the radar target and communicate with downlink cellular users in millimeter-wave …
Enhancing physical layer security with artificial noise in large-scale NOMA networks
This paper investigates the secrecy outage performance for a large-scale downlink system
with full-duplex (FD) non-orthogonal multiple access (NOMA) transmission aided by artificial …
with full-duplex (FD) non-orthogonal multiple access (NOMA) transmission aided by artificial …
RIS-aided physical layer security with full-duplex jamming in underlay D2D networks
This paper investigates the physical layer security and data transmission for the underlay
device-to-device (D2D) networks, and considers a combination of the reconfigurable …
device-to-device (D2D) networks, and considers a combination of the reconfigurable …
Constructing a health indicator for roller bearings by using a stacked auto-encoder with an exponential function to eliminate concussion
Most deep-learning models, especially stacked auto-encoders (SAEs), have been used in
recent years for the diagnosis of faults in rotating machinery. However, very few studies have …
recent years for the diagnosis of faults in rotating machinery. However, very few studies have …
Physical layer security using beamforming techniques for 5G and beyond networks: A systematic review
It has been predicted that by the year 2030, 5G and beyond 5G (B5G) networks are
expected to provide hundreds of trillions of gigabytes of data for various emerging …
expected to provide hundreds of trillions of gigabytes of data for various emerging …
On the physical layer security of the cooperative rate-splitting-aided downlink in UAV networks
Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent
logistics, search and rescue as well as in air-borne Base Station (BS). However, their …
logistics, search and rescue as well as in air-borne Base Station (BS). However, their …
Maximizing the secrecy energy efficiency of the cooperative rate-splitting aided downlink in multi-carrier UAV networks
Although Unmanned Aerial Vehicles (UAVs) are capable of significantly improving the
information security by detecting the eavesdropper's location, their limited energy motivates …
information security by detecting the eavesdropper's location, their limited energy motivates …