L Hu, S Tan, H Wen, J Wu, J Fan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We investigate the physical layer security (PLS) in multi-user interference networks. In particular, we consider secure transmission from a legitimate source (Alice) to a legitimate …
M Huang, G Li, F Gong, N Zhang, Z Yin… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The wide coverage and broadcasting characteristics of satellite communications lead to multi-beam downlinks being vulnerable to security threats, such as eavesdropping, hacking …
L Hu, J Peng, Y Zhang, H Wen, S Tan… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Secure transfer of wireless information is becoming a critical issue in multi-user interference networks. In this paper, we consider secure transmission from a source (Alice) to a legitimate …
H Xia, Y Mao, X Zhou, B Clerckx… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Rate-Splitting Multiple Access (RSMA) is an emerging and powerful multiple access scheme that relies on splitting and encoding user messages encoded into common and private …
L Hu, J Fan, H Wen, J Tang, Q Chen - arXiv preprint arXiv:2305.19574, 2023 - arxiv.org
This paper investigates physical layer security (PLS) in wireless interference networks. Specifically, we consider confidential transmission from a legitimate transmitter (Alice) to a …
L Liang, M Wang, W Cheng, W Zhang - arXiv preprint arXiv:2406.05799, 2024 - arxiv.org
To satisfy the various demands of growing devices and services, emerging high-frequency- based technologies promote near-field wireless communications. Therefore, near-field …
S Li, M Wang, X Wang, C Li, J Liu, X Cui - Wireless Networks, 2022 - Springer
In the unmanned ship networking scenario, the position of the unmanned ship changes continuously, leading to the result that the desired transmitters and the interference …
X Zheng, Y Zhao, J Lee, W Chen - China Communications, 2023 - ieeexplore.ieee.org
Due to the fading characteristics of wireless channels and the burstiness of data traffic, how to deal with congestion in Ad-hoc networks with effective algorithms is still open and …