C Wang, H Yang, L Xiao, H Lu… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Cognitive unmanned aerial vehicle (UAV) communication systems combine benefits of both the cognitive radio and UAV, which improves the spectral efficiency and communication …
This paper considers secure communications for an underlay cognitive radio network (CRN) in the presence of an external eavesdropper (Eve). The secrecy performance of CRNs is …
Y Gao, H Tang, B Li, X Yuan - IEEE Access, 2020 - ieeexplore.ieee.org
This paper investigates the physical layer security issue in an unmanned aerial vehicle (UAV) aided cognitive radio network. Specially, a UAV operates as an aerial secondary …
H Lei, H Yang, KH Park, IS Ansari, J Jiang… - arXiv preprint arXiv …, 2022 - arxiv.org
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial …
Y Jiang, J Zhu - China Communications, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are envisioned as a promising means of providing wireless services for various complex terrains and emergency situations. In this paper, we …
Y Zhou, H Zhou, F Zhou, DWK Ng… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Cognitive radio is a promising technology to improve spectral efficiency. However, communication security of a secondary network is limited by its transmit power and channel …
Y Zhou, F Zhou, H Zhou, DWK Ng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cognitive radio is a promising technology to improve spectral efficiency. However, the secure performance of a secondary network achieved by using physical layer security …
This chapter proposes a new method that uses a cooperative unmanned aerial vehicle (UAV) as a friendly jammer to enhance the security performance of cognitive radio networks …
Y Wang, L Chen, Y Zhou, X Liu, F Zhou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The secure performance of wideband cognitive radio networks (CRNs) with OFDMA (orthogonal frequency-division multiple access) achieved by using physical layer security is …