D Wang, F Zhou, VCM Leung - IEEE Transactions on Cognitive …, 2019 - ieeexplore.ieee.org
In order to provide information privacy for the primary network and support the secondary quality-of-service (QoS) requirement, we design a cooperative primary preserving strategy …
C Yu, HL Ko, X Peng, W Xie - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate the secrecy outage performance of a typical cooperative downlink non-orthogonal multiple access (NOMA) system over Nakagami-m fading channel …
D Zhai, R Zhang, L Cai, FR Yu - IEEE Journal of Selected …, 2019 - ieeexplore.ieee.org
Non-Orthogonal Multiple Access (NOMA) provides potential solutions for the stringent requirements of the Internet of Things (IoT) on low latency and high reliability. In this paper …
D Wang, P Ren, J Cheng - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We propose two cooperative secure transmission schemes to protect a two-hop buffer-aided network assisted by an energy harvesting relay. In the first scheme, we assume that the …
X Luo, Y Liu, HH Chen, Q Guo - IEEE Network, 2020 - ieeexplore.ieee.org
This article aims to provide a comprehensive overview on PHY layer security assisted ICV networks. Beginning with a discussion from a general perspective of the ICV network …
L Bai, Y Yang, Z Zhang, C Feng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
A high-coverage algorithm termed enhanced camera assisted received signal strength ratio (eCA-RSSR) positioning algorithm is proposed for visible light positioning (VLP) systems …
ET Sağlam, Ş Bahtiyar - 2019 4th International Conference on …, 2019 - ieeexplore.ieee.org
With the fulfillment of communication capabilities, vehicles are planned to have autonomous driving features with collaboration between vehicles, infrastructure units, pedestrians and …
NA Balaji, R Sukumar, M Parvathy - Computers & Electrical Engineering, 2019 - Elsevier
Abstract Vehicular Ad hoc Network has vehicles communicating with processing units. The end devices need to be secured for transmitting data in authenticated mode. However there …
In this paper, the impact of adaptive smarter eavesdroppers on the secrecy performance of a multi-antenna cellular network is investigated. The eavesdroppers can act as either passive …