Securing UAV communications via joint trajectory and power control

G Zhang, Q Wu, M Cui, R Zhang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) communication is anticipated to be widely applied in the
forthcoming fifth-generation wireless networks, due to its many advantages such as low cost …

Compressive sensing‐based coprime array direction‐of‐arrival estimation

C Zhou, Y Gu, YD Zhang, Z Shi, T Jin… - Iet …, 2017 - Wiley Online Library
A coprime array has a larger array aperture as well as increased degrees‐of‐freedom
(DOFs), compared with a uniform linear array with the same number of physical sensors …

The Rayleigh fading channel prediction via deep learning

RF Liao, H Wen, J Wu, H Song, F Pan… - … and Mobile Computing, 2018 - Wiley Online Library
This paper presents a multi‐time channel prediction system based on backpropagation (BP)
neural network with multi‐hidden layers, which can predict channel information effectively …

Light-weight physical layer enhanced security schemes for 5G wireless networks

J Tang, H Wen, K Zeng, R Liao, F Pan, L Hu - IEEE Network, 2019 - ieeexplore.ieee.org
Due to the broadcast nature of wireless radio propagation channels, 5G wireless networks
face serious security threats. Security mechanisms that leverage physical layer …

Impact of mobility on physical layer security over wireless fading channels

J Tang, M Dabaghchian, K Zeng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Wireless physical layer security has attracted great attention in recent years. Although
mobility is an intrinsic property of wireless networks, most of the existing works only consider …

Secure cooperative transmission with imperfect channel state information based on BPNN

H Song, H Wen, L Hu, S Chen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we study a secure cooperative transmission system in which a transmitter
(Alice) intends to send a secret message to an authorized receiver (Bob), with the aid of a …

Lightweight one‐time password authentication scheme based on radio‐frequency fingerprinting

Y Chen, H Wen, H Song, S Chen, F Xie… - IET …, 2018 - Wiley Online Library
The energy‐constrained devices such as the mobile terminals and nodes of the Internet of
Things make lightweight security schemes an urgent need. The traditional identity …

Reliability and security performance analysis of hybrid satellite-terrestrial multi-relay systems with artificial noise

M Huang, F Gong, N Zhang, G Li, F Qian - IEEE Access, 2021 - ieeexplore.ieee.org
Land mobile satellite communication and physical layer security are considered as the
promising paradigms in beyond 5G networks. In this paper, we establish the multi-relay …

A unified QoS and security provisioning framework for wiretap cognitive radio networks: A statistical queueing analysis approach

Y Wang, X Tang, T Wang - IEEE Transactions on Wireless …, 2019 - ieeexplore.ieee.org
Due to the spectrum-sharing feature of cognitive radio networks (CRNs) and the
broadcasting nature of wireless channels, providing quality-of-service (QoS) provisioning for …

Adaptive base station cooperation for physical layer security in two-cell wireless networks

L Hu, H Wen, B Wu, J Tang, F Pan - IEEE Access, 2016 - ieeexplore.ieee.org
We study physical layer security in two-cell wireless networks in which a base station (Alice)
intends to send a confidential message to a legitimate user (Bob) with the help of a …