The massive multiple input multiple output (mMIMO) provides reliable base station (BS) for the mobile users (MUs) with CSI (channel state information) and jointly offers spectral …
Y Jin, X Li, G Lv, M Zhao, Y Jin - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, we consider a cooperative orthogonal frequency division multiple access (OFDMA) system, where a source communicates with multiple users with the help of an …
N Le Cuong, TM Hoang, PT Hiep - Computer Communications, 2024 - Elsevier
Non-orthogonal multiple access (NOMA) systems have indicated that they can provide higher spectral efficiency and secrecy capability compared with orthogonal multiple access …
X Tong, X Li, F Dong, W Wang… - Transactions on Emerging …, 2022 - Wiley Online Library
This article studies the secrecy rate optimization in the downlink transmission of a dual‐ functional radar‐communication system, under the simultaneous wireless information and …
J Choi, J Joung - Signal Processing, 2022 - Elsevier
In this paper, we consider a two-way relay (TWR) network that two source nodes (SNs) with multiple antennas exchange data to each other via a relay node (RN) with multiple …
L Sun, H Xu, Y Zhang - IEEE Wireless Communications Letters, 2020 - ieeexplore.ieee.org
In this letter we present a physical-layer-security (PLS) experimental platform that realizes secure transmission over a two-way untrusted relaying system. A novel PLS approach called …
A Taneja, N Saluja - International Journal of …, 2022 - inderscienceonline.com
In this paper, a 5G mobile communication system is considered with cooperative environment. The mobile and base-station node communicate with each other through a …
W Li, M Huang, X Lu - IEEE Communications Letters, 2024 - ieeexplore.ieee.org
This letter proposes a key exchange scheme for the untrusted relay system, where the relay not only assists in message transmission but also tries to recover messages. Terminal users …
J Xing, T Lv, Y Cao, J Zeng, P Huang - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
User privacy protection is considered a critical issue in wireless networks, which drives the demand for various secure information interaction techniques. In this article, we introduce an …