HV Poor, RF Schaefer - Proceedings of the National …, 2017 - National Acad Sciences
… in wireless data transmission. By using an information theoretic formalism, we have seen that, in all of the principal channel models of wireless networking, the physicallayer can in …
Z Qin, H Ye, GY Li, BHF Juang - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… wireless communications. This article will identify the gains that DL can bring to wireless physicallayer … research directions in the area of DL-based physicallayer communications. …
H Kim, S Oh, P Viswanath - … on Selected Areas in Information …, 2020 - ieeexplore.ieee.org
… cable and DSL modems) and wireless (cellular, Wifi, and satel- lite), is a primary workhorse of the modern information age. At the core of the physicallayer communication system is the …
… techniques used to enhance secrecy in the physicallayer of multiantenna wireless communication systems. Motivated by results in information theory, signal processing techniques in …
Y Shi, YE Sagduyu - IEEE Transactions on Mobile Computing, 2022 - ieeexplore.ieee.org
… membership inference attack (MIA) is presented to leak private information from a wireless … ) provides powerful means to classify wireless signals, eg, for PHY-layer authentication. As an …
… for communications at the physicallayer, ranging from … We also compare GAIenabled physicallayer communications … and advancement of GAI in physicallayer communications. …
Q He, E Yang, S Fang - IEEE Communications Surveys & …, 2024 - ieeexplore.ieee.org
… CSI offers detailed insights into the channel, but it requires physicallayer (ie, PHYlayer) access. ToF and AoA provide precise timing and angle information, but they typically require …
P Walther, T Strufe - … Conference on Trust, Security and Privacy …, 2020 - ieeexplore.ieee.org
… In this paper we have investigated how one of the most fundamental assumptions of Physical Layer Security — that adversaries residing further than half a wavelength away from the …
… information-theoretic secrecy for physicallayer security systems in Section 1.2 and Section 1.3. While Shannon’s result sheds a fairly pessimistic light on the usefulness of information…