A tutorial on interference exploitation via symbol-level precoding: Overview, state-of-the-art and future directions

A Li, D Spano, J Krivochiza… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Interference is traditionally viewed as a performance limiting factor in wireless
communication systems, which is to be minimized or mitigated. Nevertheless, a recent line of …

Interplay between NOMA and other emerging technologies: A survey

M Vaezi, GAA Baduge, Y Liu, A Arafa… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) has been widely recognized as a promising way to
scale up the number of users, enhance the spectral efficiency, and improve the user-fairness …

Balancing QoS and security in the edge: Existing practices, challenges, and 6G opportunities with machine learning

ZM Fadlullah, B Mao, N Kato - IEEE Communications Surveys & …, 2022 - ieeexplore.ieee.org
While the emerging 6G networks are anticipated to meet the high-end service quality
demands of the mobile edge users in terms of data rate and delay satisfaction, new attack …

Enhancing physical-layer security for IoT with nonorthogonal multiple access assisted semi-grant-free transmission

K Cao, H Ding, B Wang, L Lv, J Tian… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Nonorthogonal multiple access (NOMA) assisted semi-grant-free transmission admits grant-
free users to access the channels otherwise solely occupied by grant-based users, and has …

Intelligent reflecting surface assisted anti-jamming communications: A fast reinforcement learning approach

H Yang, Z Xiong, J Zhao, D Niyato, Q Wu… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Malicious jamming launched by smart jammers can attack legitimate transmissions, which
has been regarded as one of the critical security challenges in wireless communications …

Key generation from wireless channels: A review

J Zhang, TQ Duong, A Marshall, R Woods - Ieee access, 2016 - ieeexplore.ieee.org
Key generation from the randomness of wireless channels is a promising alternative to
public key cryptography for the establishment of cryptographic keys between any two users …

Securing the internet of things in the age of machine learning and software-defined networking

F Restuccia, S D'oro, T Melodia - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) realizes a vision where billions of interconnected devices are
deployed just about everywhere, from inside our bodies to the most remote areas of the …

A comprehensive survey on cooperative relaying and jamming strategies for physical layer security

F Jameel, S Wyne, G Kaddoum… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Physical layer security (PLS) has been extensively explored as an alternative to
conventional cryptographic schemes for securing wireless links. Many studies have shown …

Secure transmission in cognitive satellite terrestrial networks

K An, M Lin, J Ouyang, WP Zhu - IEEE Journal on Selected …, 2016 - ieeexplore.ieee.org
This paper investigates the physical layer security of a satellite network, whose downlink
spectral resource is shared with a terrestrial cellular network. We propose to employ a multi …

On optimizing VLC networks for downlink multi-user transmission: A survey

M Obeed, AM Salhab, MS Alouini… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The evolving explosion in high data rate services and applications will soon require the use
of untapped, abundant unregulated spectrum of the visible light for communications to …