Y Chen, W Li, XZ Cheng, P Hu - High-Confidence Computing, 2024 - Elsevier
In today's information age, eavesdropping has been one of the most serious privacy threats in information security, such as exodus spyware (Rudie et al., 2021) and pegasus spyware …
G Hu, Z Li, J Si, K Xu, D Xu, Y Cai… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) plays an important role in wireless communication systems, due to the additional degree of freedom realized from its flexible deployment. Driven by this …
G Hu, Q Wu, J Si, K Xu, Z Li, Y Cai… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Wireless information surveillance has received widespread attention due to the urgency of monitoring growing suspicious communications. This paper considers a challenging …
Z Wu, K Guo, X Li, YD Zhang, M Zhu… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
This work investigates the proactive eavesdropping based legitimate surveillance for integrated satellite-terrestrial relay networks with multiple proactive monitors. To study the …
B Li, K Cui - IEEE Communications Letters, 2022 - ieeexplore.ieee.org
In this letter, we study an intelligent reflecting surface (IRS)-assisted proactive eavesdropping system, where a legitimate monitor (LM) eavesdrops a point-to-point …
Q Dan, H Lei, KH Park, W Lei… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Wireless relays can effectively extend the transmission range of information. However, if relay technology is utilized unlawfully, it can amplify potential harm. Effectively surveilling …
A cell-free massive multiple-input multiple-output (CF-mMIMO) system is considered for enhancing the monitoring performance of wireless surveillance, where a large number of …
L Jiao, Y Ge, K Zeng, BC Hilburn - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this work, we investigate the benefits of secondary user (SU) network beamforming on improving primary user (PU) location privacy in spectrum sharing systems, where the …
Wireless surveillance, in which untrusted communications links are proactively monitored by legitimate agencies, has started to garner a lot of interest for enhancing the national security …