Joint information and jamming beamforming for secrecy rate maximization in cognitive radio networks

VD Nguyen, TQ Duong, OA Dobre… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we consider the secure beamforming design for an underlay cognitive radio
multiple-input single-output broadcast channel in the presence of multiple passive …

UAV-assisted secure communications in terrestrial cognitive radio networks: Joint power control and 3D trajectory optimization

PX Nguyen, VD Nguyen, HV Nguyen… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper considers secure communications for an underlay cognitive radio network (CRN)
in the presence of an external eavesdropper (Eve). The secrecy performance of CRNs is …

Resource allocation for cognitive radio with primary user secrecy outage constraint

D Xu, Q Li - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
We consider a cognitive radio network where multiple secondary users (SUs) coexist with a
primary user (PU). There exist multiple eavesdroppers (EAVs) who attempt to overhear the …

Physical layer security in the presence of interference

DS Karas, AAA Boulogeorgos… - IEEE Wireless …, 2017 - ieeexplore.ieee.org
We evaluate and quantify the joint effect of fading and multiple interferers on the physical-
layer (PHY) security of a system consisting of a base-station (BS), a legitimate user, and an …

Enhancing security of primary user in underlay cognitive radio networks with secondary user selection

M Qin, S Yang, H Deng, MH Lee - IEEE Access, 2018 - ieeexplore.ieee.org
This paper investigates the effect of multiuser gain provided by the secondary user selection
on the secrecy performance of the primary users. We first propose a simple scheme where …

Enhancing PHY security of cooperative cognitive radio multicast communications

VD Nguyen, TQ Duong, OS Shin… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
In this paper, we propose a cooperative approach to improve the security of both primary
and secondary systems in cognitive radio multicast communications. During their access to …

Anti-modulation-classification Transmitter Design Against Deep Learning Approaches

B He, F Wang - IEEE Transactions on Wireless …, 2023 - ieeexplore.ieee.org
For the modulation classification problems, the deep learning approaches can determine the
unknown modulation formats in high confidence. However, it has been maliciously used by …

Energy-efficient resource allocation for secure cognitive radio network with delay QoS guarantee

Z Bai, L Ma, Y Dong, P Ma, Y Ma - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
A joint resource allocation policy for an underlay multi-user secure cognitive radio network
(CRN) adopting the time-division multiple-access scheme with the guarantee of the …

Secrecy outage probability analysis over Malaga-Malaga fading channels

JY Wang, C Liu, JB Wang, J Dai, M Lin… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
As a novel statistical model, Málaga distribution is proposed recently, which covers many
commonly used fading models as special cases. The secure transmission of information …

Improving physical‐layer security for primary users in cognitive radio networks

D Xu, Q Li - IET Communications, 2017 - Wiley Online Library
In this study, the authors investigate the physical‐layer security in a cognitive radio network
where both the secondary user (SU) and the primary user (PU) are facing security threats …