A 0.31-THz orbital-angular-momentum (OAM) wave transceiver in CMOS with bits-to-OAM mode mapping

MIW Khan, J Woo, X Yi, MI Ibrahim… - IEEE Journal of Solid …, 2022 - ieeexplore.ieee.org
This article reports the first chip-based demonstration (at any frequency) of a transceiver
front end that transmits and receives electromagnetic waves with a helical distribution of …

Deep learning for the Gaussian wiretap channel

R Fritschek, RF Schaefer… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
End-to-end learning of communication systems with neural networks and particularly
autoencoders is an emerging research direction which gained popularity in the last year. In …

Trade reliability for security: Leakage-failure probability minimization for machine-type communications in URLLC

Y Zhu, X Yuan, Y Hu, RF Schaefer… - IEEE Journal on …, 2023 - ieeexplore.ieee.org
How to provide information security while fulfilling ultra reliability and low-latency
requirements is one of the major concerns for enabling the next generation of ultra-reliable …

A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challenges

P Yadav, S Kumar, R Kumar - Transactions on Emerging …, 2021 - Wiley Online Library
Due to the open nature of wireless communication systems, the data transmission over
these networks are vulnerable to malicious attack. To safeguard the transmitted data …

4.6 space-time modulated 71-to-76ghz mm-wave transmitter array for physically secure directional wireless links

X Lu, S Venkatesh, B Tang… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Security in wireless networks has traditionally been addressed above the physical layer.
With the expected proliferation of applications in 5G, the mm-wave spectrum and new …

Beamforming optimization for physical layer security in MISO wireless networks

Z Sheng, HD Tuan, TQ Duong… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where
the transmitters are equipped with multiple antennas, while the users and eavesdropper are …

Effective secrecy rate for a downlink NOMA network

W Yu, A Chorti, L Musavian, HV Poor… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, a novel approach is introduced to study the achievable delay-guaranteed
secrecy rate, by introducing the concept of the effective secrecy rate (ESR). This study …

In-Band Full-Duplex: The Physical Layer

B Smida, R Wichman, KE Kolodziej… - Proceedings of the …, 2024 - ieeexplore.ieee.org
In this article, we review the key concepts and the progress in the design of physical-layer
aspects of in-band full-duplex (IBFD) communications. One of the fundamental challenges in …

Relay-aided secure broadcasting for visible light communications

A Arafa, E Panayirci, HV Poor - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A visible light communication broadcast channel is considered, in which a transmitter
luminaire communicates with two legitimate receivers in the presence of an external …

UAV trajectory and multi-user beamforming optimization for clustered users against passive eavesdropping attacks with unknown CSI

AS Abdalla, A Behfarnia… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article tackles the fundamental passive eavesdropping problem in modern wireless
communications in which the location and the channel state information (CSI) of the …