Key generation from the randomness of wireless channels is a promising alternative to public key cryptography for the establishment of cryptographic keys between any two users …
Malicious jamming launched by smart jammers can attack legitimate transmissions, which has been regarded as one of the critical security challenges in wireless communications …
Device-to-device (D2D) communication presents a new paradigm in mobile networking to facilitate data exchange between physically proximate devices. The development of D2D is …
D Wang, B Bai, W Zhao, Z Han - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. The research on physical layer …
S Sahoo, T Dragičević… - IEEE Journal of Emerging …, 2019 - ieeexplore.ieee.org
Grid-tied power electronic converters are key enabling technologies for interfacing renewable energy sources, energy storage, electrical vehicles, microgrids, and high-voltage …
Due to the dramatic increase in high data rate services and in order to meet the demands of the fifth-generation (5G) networks, researchers from both academia and industry are …
W Wei, X Pang, J Tang, N Zhao, X Wang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Combining intelligent reflecting surface (IRS) and unmanned aerial vehicle (UAV) offers a new degree of freedom to improve the coverage performance. However, it is more …
J Ahmed, TN Nguyen, B Ali, MA Javed… - IEEE Journal of …, 2022 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) connects different medical devices, health sensors and hospital records to data platforms using wireless communications. Federated Learning (FL) …
P Yue, J An, J Zhang, J Ye, G Pan… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever- increasing user demands, reduced costs, and technological progress. Since there is a lack …