A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
A comprehensive survey on cooperative relaying and jamming strategies for physical layer security
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …
conventional cryptographic schemes for securing wireless links. Many studies have shown …
Robust and secure sum-rate maximization for multiuser MISO downlink systems with self-sustainable IRS
This paper investigates robust and secure multiuser multiple-input single-output (MISO)
downlink communications assisted by a self-sustainable intelligent reflection surface (IRS) …
downlink communications assisted by a self-sustainable intelligent reflection surface (IRS) …
Robust beamforming design for RIS-aided integrated sensing and communication system
It is expected that the future intelligent transportation system will be endowed with the
sensing ability to cope with the complex road environment. Therefore, the integrated sensing …
sensing ability to cope with the complex road environment. Therefore, the integrated sensing …
Design and optimization technologies of permanent magnet machines and drive systems based on digital twin model
One of the keys to the success of the fourth industrial revolution (Industry 4.0) is to empower
machinery with cyber–physical systems connectivity. The digital twin (DT) offers a promising …
machinery with cyber–physical systems connectivity. The digital twin (DT) offers a promising …
Performance analysis for UAV-jammer aided covert communication
This paper investigates the performance analysis for a novel covert communication system,
where a friendly UAV-jammer is used to protect the covert transmission from Alice to Bob …
where a friendly UAV-jammer is used to protect the covert transmission from Alice to Bob …
Secrecy rate maximization with artificial-noise-aided beamforming for MISO wiretap channels under secrecy outage constraint
B Wang, P Mu, Z Li - IEEE Communications Letters, 2014 - ieeexplore.ieee.org
The secrecy rate maximization with the artificial noise (AN) aided beamforming for the
multipel-input-single-output (MISO) wiretap channel is addressed in this paper under the …
multipel-input-single-output (MISO) wiretap channel is addressed in this paper under the …
Coordinated beamforming with artificial noise for secure SWIPT under non-linear EH model: Centralized and distributed designs
This paper investigates the artificial noise (AN)-aided multi-cell coordinated beamforming
(MCBF) for secure simultaneous wireless information and power transfer in both centralized …
(MCBF) for secure simultaneous wireless information and power transfer in both centralized …
Robust Beamforming Design for IOS-Assisted Multi-User MISO Systems With Imperfect CSI
X Yao, F Hu, Z Ling, H Zhang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Intelligent omni-surface (IOS) has been identified as an innovative technology to achieve
omnidirectional wireless coverage for mobile users. However, due to the passive …
omnidirectional wireless coverage for mobile users. However, due to the passive …
Robust MISO beamforming with cooperative jamming for secure transmission from perspectives of QoS and secrecy rate
H Ma, J Cheng, X Wang, P Ma - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Robust quality-of-service (QoS)-based and secrecy rate-based secure transmission designs
are investigated for a multiple-input single-output system with multiple eavesdroppers and a …
are investigated for a multiple-input single-output system with multiple eavesdroppers and a …