In this letter, we study the secrecy capacity of the classic Wyner's model over the α-μ fading channels, where α and μ specify the nonlinearity and clustering of fading channels …
H Wang - Wiley Interdisciplinary Reviews: Computational …, 2023 - Wiley Online Library
Tolerance intervals (TIs) are widely used in various applications including manufacturing engineers, clinical research, and pharmaceutical industries. TIs can be used to construct …
H Lei, M Xu, IS Ansari, G Pan… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
In this paper, we consider an underlay multiple-input-multiple-output (MIMO) cognitive radio network (CRN) including a pair of primary nodes, a couple of secondary nodes, and an …
H Lei, Z Dai, KH Park, W Lei, G Pan… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
We analyze a secure dual-hop mixed radio frequency-free space optical (RF-FSO) downlink simultaneous wireless information and power transfer system. The FSO link and all RF links …
In this paper, we study the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) transmission systems. All RF links experience Nakagami-m fading and the …
D Wu, Z Zhang, S Wu, J Yang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The fifth generation (5G) mobile communication system is regard as a key enabler in promoting the deployment of Internet of Things (IoT), which is accompanied by the …
G Pan, H Lei, Y Deng, L Fan, J Yang… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power transfer (SWIPT) system, including one base station (BS) equipped with multiple …
The security issue is investigated from a physical layer perspective in the context of free- space optical (FSO) communications. More precisely, the performance of secure FSO link …
In this paper, we initially investigate the physical layer security over device-to-device communications, where the channel is modeled from the Fisher-Snedecor. T distribution. To …