Z Liu, S Wang, Y Liu, Y Wang - IEEE Transactions on Wireless …, 2018 - ieeexplore.ieee.org
… In this paper, we study a secrecy transmission problem for a downlink two-… eavesdropper wiretaps the legitimate macrocell user. More specifically, we aim to maximize the secrecyrate …
… We derive the ergodic secrecyrate of the … externaleavesdropper, we reduce our system to the one in [20] and derive the ergodic secrecyrate of the near user and also the ergodic rate …
Y Chen, OO Koyluoglu, A Sezgin - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
… without an externaleavesdropper has been … secrecy constraint [1]–[3], or subject to a joint secrecy constraint (whereby the information leakage from both messages to the eavesdropper …
K Cao, B Wang, H Ding, T Li, J Tian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… We analyze the secrecy performance for the scenarios with … near user and external eavesdroppers, and respectively … of secrecyrate, the SNR at the most detrimental eavesdropper is …
… the secrecyrate as the given service rate, we propose in turn the novel concept of the effective secrecyrate (… In the presence of a malicious externaleavesdropper, a lower bound and an …
H Chen, X Tao, N Li, X Li - 2016 IEEE International Conference …, 2016 - ieeexplore.ieee.org
… ii) We derive the mean secrecyrates of the two proposed scenarios, where AN assisted case outperforms the nonAN case by up to almost 2.7 times when optimal power allocation …
G Prema, R Sowmini - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
… broadcast channel with confidential messages and externaleavesdroppers (BCCE), where … presence of randomly located externaleavesdroppers. The secrecy capacity is measured in …
… Notably, [18] investigated achievable secrecyrates by using the so-called intrinsically secure graph formalism, taking into account the effects of ED collusion. Additionally, based on a …
Y Gao, H Tang, B Li, X Yuan - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
… both multiple externaleavesdroppers (Eves) and other GUs that potentially act as internal Eves. To ensure the user fairness, we maximize the minimum average secrecyrate among all …