X Liu, K Zheng, XY Liu, X Wang, G Dai - IEEE Access, 2018 - ieeexplore.ieee.org
In a cognitive radio network (CRN), the interference caused by secondary users (SUs) is conventionally regarded as an obstacle to the throughput of the primary network. However …
H Song, H Wen, Q Yang, J Tang, Y Chen… - IEEE …, 2021 - ieeexplore.ieee.org
For real-time industrial wireless edge-enabled cyber-physical systems, this paper proposes an adaptive secure transmission mechanism under the large scale path loss to fight against …
B Qiu, H Xiao, AT Chronopoulos, D Zhou… - IEEE Access, 2020 - ieeexplore.ieee.org
In a cellular vehicle-to-everything (C-V2X) enabled computation-offloading network, vehicular users may deliver computation tasks to a cellular base station (BS) through vehicle …
H Lei, F Yang, IS Ansari, H Liu, KJ Kim… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the uplink cognitive radio-inspired nonorthogonal multiple access (CR-NOMA) systems, the successive interference cancellation (SIC), and power control (PC) schemes were …
D Wang, P Ren - 2018 IEEE Global Communications …, 2018 - ieeexplore.ieee.org
In order to protect the primary information and provide some licensed spectrum for the secondary system, we propose a secure transmission scheme, where the primary privacy …
Y Wu, K Guo, J Huang, XS Shen - IEEE Journal on Selected …, 2016 - ieeexplore.ieee.org
Offloading cellular mobile users'(MUs') data traffic to small-cell networks is a cost-effective approach to relieve congestion in macrocell cellular networks. However, as many small-cell …
P Yan, X Ji, Y Zou, B Li - IEEE Transactions on Green …, 2023 - ieeexplore.ieee.org
This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each …
X Liu, Y Gao, M Guo, N Sha - IEEE Access, 2019 - ieeexplore.ieee.org
This paper investigates secure communication from a wireless-powered transmitter to a desired receiver with multiple eavesdroppers in the wireless powered communication …
J Hu, W Yang, N Yang, X Zhou… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We design new secure on-off transmission schemes in wiretap channels with outdated channel state information (CSI). In our design, we consider not only the outdated CSI from …