Z Xiang, W Yang, Y Cai, Z Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we design a secure transmission scheme in hybrid automatic repeat request (HARQ) assisted cognitive non-orthogonal multiple access (NOMA) networks, where a …
Z Xiang, X Tong, Y Cai - China Communications, 2020 - ieeexplore.ieee.org
This paper investigates secure transmission for non-orthogonal multiple access (NOMA) systems where the imperfect successive interference cancellation (SIC) is considered at …
Z Xiang, W Yang, G Pan, Y Cai… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper employs hybrid automatic repeat request (HARQ) to assist the cognitive non- orthogonal multiple access (NOMA) scheme for secure transmission in Internet of Things …
B He, L Lv, L Yang, J Chen - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter investigates secure transmission for a cooperative non-orthogonal multiple access (NOMA) network consisting of multiple near users (NUs), a far user (FU) and an …
H Lei, F Yang, H Liu, IS Ansari, KJ Kim… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Semi-grant-free (SGF) transmission scheme enables grant-free (GF) users to utilize resource blocks allocated for grant-based (GB) users while maintaining the quality of service of GB …
S Han, X Xu, X Tao, P Zhang - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
In this paper, we consider the physical layer security for non-orthogonal multiple access (NOMA)-based uplink massive machine type communication (mMTC) networks. Aiming at …
In this paper, an Internet-of-Things (IoT) system containing a relay selection is studied as employing an emerging multiple access scheme, namely non-orthogonal multiple access …
In this letter, we carry out the performance analysis of the simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) in the hybrid automatic repeat …
DD Tran, DB Ha - … Conference on Recent Advances in Signal …, 2018 - ieeexplore.ieee.org
In this paper, we consider the physical layer security of a downlink non-orthogonal multiple access (NOMA) system, in which users' quality of service (QoS) requirements are …