L Hu, J Peng, Y Zhang, H Wen, S Tan… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Secure transfer of wireless information is becoming a critical issue in multi-user interference networks. In this paper, we consider secure transmission from a source (Alice) to a legitimate …
Z Sheng, HD Tuan, AA Nasir, HV Poor… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Under both long (infinite) and short (finite) blocklength transmissions, this paper considers physical layer security for a wireless interference network of multiple transmitter-user pairs …
L Ruan, VKN Lau, MZ Win - IEEE Transactions on Signal …, 2015 - ieeexplore.ieee.org
In contrast to its wired counterpart, wireless communication is highly susceptible to eavesdropping due to the broadcast nature of the wireless propagation medium. Recent …
We address physical layer security in multiple-input-multiple-output (MISO) communications in the presence of an unknown passive eavesdropper. Beamforming and artificial noise …
Y Fan, A Li, X Liao, VCM Leung - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we focus on the physical layer security for a K-user multiple-input-single-output (MISO) wiretap channel in the presence of a malicious eavesdropper, where we propose …
H Xia, X Zhou, S Han, C Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we focus on antieavesdropping design in a multicell multiuser interference channel coexisting with a multiantenna eavesdropper, in which multiuser interference arises …
AA Nasir, HD Tuan, HH Nguyen… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
Physical layer security (PLS) aims to protect end users who are equipped with low- complexity receivers for which implementing cryptographic algorithms for security purposes …
L Ruan, VKN Lau, MZ Win - IEEE Transactions on Signal …, 2015 - ieeexplore.ieee.org
Interference alignment (IA) has attracted enormous research interest as it achieves optimal capacity scaling with respect to signal to noise ratio on interference networks. IA has also …
This paper studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper …