L Hu, S Tan, H Wen, J Wu, J Fan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We investigate the physical layer security (PLS) in multi-user interference networks. In particular, we consider secure transmission from a legitimate source (Alice) to a legitimate …
L Hu, J Peng, Y Zhang, H Wen, S Tan… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Secure transfer of wireless information is becoming a critical issue in multi-user interference networks. In this paper, we consider secure transmission from a source (Alice) to a legitimate …
L Ruan, VKN Lau, MZ Win - IEEE Transactions on Signal …, 2015 - ieeexplore.ieee.org
In contrast to its wired counterpart, wireless communication is highly susceptible to eavesdropping due to the broadcast nature of the wireless propagation medium. Recent …
L Ruan, VKN Lau, MZ Win - IEEE Transactions on Signal …, 2015 - ieeexplore.ieee.org
Interference alignment (IA) has attracted enormous research interest as it achieves optimal capacity scaling with respect to signal to noise ratio on interference networks. IA has also …
C Tian, P Ren, Q Du, L Sun… - GLOBECOM 2017-2017 …, 2017 - ieeexplore.ieee.org
The security of the interference alignment (IA)-based networks is of uttermost importance for the application of interference alignment in multi-user networks. Several recent works have …
J Guo, N Zhao, Z Yang, FR Yu, Y Chen… - IEEE Systems …, 2017 - ieeexplore.ieee.org
Interference alignment (IA) is a prospective method to achieve interference management in wireless networks. On the other hand, jamming can be deemed either as a potential threat to …
Z Sheng, HD Tuan, AA Nasir… - 2017 IEEE Globecom …, 2017 - ieeexplore.ieee.org
Considering a multi-user interference network with an eavesdropper, this paper investigates the problem of power allocation to optimize the worst secrecy throughput among the network …
This letter deals with the secrecy capacity of the radio channel in interference-limited regime. We assume that interferers are uniformly scattered over the network area according to a …
In this thesis, the degrees of freedom (DOF) of wireless networks are studied with imperfect channel state information at transmitters (CSIT) and/or secrecy constraints. Different …