R Ma, H Wu, L Wang, J Ou, L Yan - China Communications, 2021 - ieeexplore.ieee.org
… Cooperativerelaying has been regarded as a powerful tool to expand communication … over the downlink orthogonal frequency division multiple access systems with a wireless-powered …
… cooperative transmissions when the relays may themselves be eavesdroppers, ie, we may face with the untrustedrelaying scenario where the relays … issue, a new cooperative jamming …
… the secrecy performance of a cooperative wireless network comprised of a source, a destination and an … The downlink scenario is shown where the relay operates as both assistant and …
Y Jin, X Li, G Lv, M Zhao, Y Jin - Sensors, 2022 - mdpi.com
… We consider a two-way cooperative OFDM system with untrustedrelaying, as shown in … exchange confidential information via an untrustedrelay R . The two-way relay operates in a half-…
H Xu, L Sun - IEEE Transactions on Wireless Communications, 2018 - ieeexplore.ieee.org
… overlapping at the relay. Consequently, an error floor is created at the untrustedrelay, and … method, which exploits the intrinsic user-cooperation mechanism to “virtualize” two identical …
Y Fan, X Liao, R Yao, X Zuo… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
… untrustedrelay network, which obtains higher spectral efficiency theoretically than HD mode, existing works always adopted cooperative jamming [11], source and relay … in the downlink. …
… cooperation with the untrustedrelay nodes can achieve a higher secrecy rate than just treating the untrustedrelay … frequencydivision multiple-access downlink network. An energy-…
L Sun, H Xu - IEEE Transactions on Vehicular Technology, 2018 - ieeexplore.ieee.org
… cooperation period II is similar to that during cooperation … The detailed descriptions of the operations at the untrustedrelay as … cooperation period, the average transmit power of the relay …
S Ahmad, MJ Khan - Wireless Personal Communications, 2023 - Springer
… We propose a cooperative NOMA system for downlink communication that consists of an untrusted user, a DF relay, and two mobile users with different channel conditions. …