Location-privacy-aware review publication mechanism for local business service systems

X Zheng, Z Cai, J Li, H Gao - IEEE INFOCOM 2017-IEEE …, 2017 - ieeexplore.ieee.org
Local business service systems (LBSS), such as Yelp and Dianping, play an essential role
in making decisions like choosing a restaurant for our daily life. These systems heavily rely …

SIC-based secrecy performance in uplink NOMA multi-eavesdropper wiretap channels

K Jiang, T Jing, Y Huo, F Zhang, Z Li - IEEE Access, 2018 - ieeexplore.ieee.org
A new paradigm of uplink non-orthogonal multiple access along with multiple
eavesdroppers to achieve secrecy transmission is studied in this paper. We investigate the …

Secure transmission over multiple access wiretap channel by cross-time interference injection

H He, S Lyu, B Feng - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Due to the openness of wireless communication, information transmitted in the multiple
access channel is vulnerable to eavesdropping by illegitimate users. Classic artificial noise …

Jamming-aided secrecy performance in secure uplink NOMA system

K Jiang, W Zhou, L Sun - IEEE access, 2020 - ieeexplore.ieee.org
A novel secrecy scenario of uplink non-orthogonal multiple access (NOMA) along with
cooperative jammer (s) to improve secrecy performance is studied in this work. We first …

Secure transmission in multiple access wiretap channel: Cooperative jamming without sharing CSI

H He, X Luo, J Weng, K Wei - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
This paper investigates the secure transmission in multiple access wiretap channels, where
multiple legitimate users transmit private information to an intended receiver in the presence …

The secrecy analysis over physical layer in NOMA-enabled cognitive radio networks

L Wei, T Jing, X Fan, Y Wen… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
An underlay cognitive radio network (CRN) with non-orthogonal multiple access (NOMA) is
a promising multiple access scheme to solve the problem of scarce spectrum. This novel …

A novel cooperative jamming scheme for wireless social networks without known CSI

L Huang, X Fan, Y Huo, C Hu, Y Tian, J Qian - IEEE Access, 2017 - ieeexplore.ieee.org
Considering a wireless social network, we investigate a cooperative jamming scheme based
on the space power synthesis with unknown channel state information (CSI) of …

ZF-SIC based individual secrecy in SIMO multiple access wiretap channel

K Jiang, T Jing, F Zhang, Y Huo, Z Li - IEEE Access, 2017 - ieeexplore.ieee.org
In this paper, a decoding method of joint zero-forcing and successive interference
cancellation (ZF-SIC) is put forward to assist the study of the individual secrecy in the quasi …

Secure transmission in wireless ad-hoc networks without CSI at the destination

H He, X Li - Ad Hoc Networks, 2024 - Elsevier
Due to the openness of wireless communication, the transmission in ad hoc networks is
vulnerable to eavesdropping by illegitimate users. The traditional work generally assumes …

Energy‐Efficient Computational Offloading for Secure NOMA‐Enabled Mobile Edge Computing Networks

H Wang - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
Computational offloading and nonorthogonal multiple access (NOMA) are two promising
technologies for alleviating the problems of limited battery capacity, insufficient …