A feature-based learning system for Internet of Things applications

D Wu, H Shi, H Wang, R Wang… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
In many applications of Internet of Things (IoT), the huge amount of data are generated by
sensor nodes and processing them are complex. Offloading data classification and anomaly …

On secure underlay MIMO cognitive radio networks with energy harvesting and transmit antenna selection

H Lei, M Xu, IS Ansari, G Pan… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
In this paper, we consider an underlay multiple-input-multiple-output (MIMO) cognitive radio
network (CRN) including a pair of primary nodes, a couple of secondary nodes, and an …

Secrecy outage analysis of mixed RF-FSO downlink SWIPT systems

H Lei, Z Dai, KH Park, W Lei, G Pan… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
We analyze a secure dual-hop mixed radio frequency-free space optical (RF-FSO) downlink
simultaneous wireless information and power transfer system. The FSO link and all RF links …

Secure directional modulation with few-bit phase shifters: Optimal and iterative-closed-form designs

Z Wei, C Masouros, F Liu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, directional modulation (DM) is investigated to enhance physical layer security.
Practical transmitter designs are exploited under imperfect channel state information (CSI) …

Physical layer security for V2I communications: Reflecting surfaces vs. relaying

N Mensi, DB Rawat, E Balti - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
Wireless vehicular network (WVN) is exponentially gaining attention from industries and
researchers since it is the keystone of intelligent transportation systems (ITS). Despite the …

Secrecy Performance Analysis of SIMO Systems Over Correlated Shadowed Fading Channels

J Sun, H Bie, X Li, J Zhang, G Pan, KM Rabie - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, the secrecy performance of single-input-multiple-output systems over
correlated κ-μ shadowed fading channels is investigated. In particular, based on the classic …

On the physical layer security of mixed FSO-RF SWIPT system with non-ideal power amplifier

R Singh, M Rawat, A Jaiswal - IEEE Photonics Journal, 2021 - ieeexplore.ieee.org
Free-space optical (FSO) links are contemplated as a potential paradigm to yield efficient
point-to-point communication in wireless systems. Notably, these links are used to provide …

Secrecy performance enhancement for underlay cognitive radio networks employing cooperative multi-hop transmission with and without presence of hardware …

P Tran Tin, D The Hung, TN Nguyen, TT Duy… - Entropy, 2019 - mdpi.com
In this paper, we consider a cooperative multi-hop secured transmission protocol to underlay
cognitive radio networks. In the proposed protocol, a secondary source attempts to transmit …

Energy efficiency of secure cognitive radio networks with cooperative spectrum sharing

X Liu, K Zheng, L Fu, XY Liu, X Wang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Energy-efficient and secure wireless communications have recently earned tremendous
interests due to economic, environmental, and military concerns. This paper investigates the …

Secrecy Analysis in DF Relay Over Generalized- Fading Channels

H Zhao, Z Liu, L Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this paper, we analyze the secrecy performance of the decode-and-forward (DF) relay
system in generalized-K fading channels. In a typical four-node communications model, a …