Exploiting interference for energy harvesting: A survey, research issues, and challenges

N Zhao, S Zhang, FR Yu, Y Chen, A Nallanathan… - IEEE …, 2017 - ieeexplore.ieee.org
Interference is one of the fundamental aspects that makes wireless communication
challenging, which has attracted great research attention for decades. To solve this …

Physical layer security enhancement with reconfigurable intelligent surface-aided networks

J Zhang, H Du, Q Sun, B Ai… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Reconfigurable intelligent surface (RIS)-aided wireless communications have drawn
significant attention recently. We study the physical layer security of the downlink RIS-aided …

Multi-antenna covert communications in random wireless networks

TX Zheng, HM Wang, DWK Ng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper studies multi-antenna-aided covert communications coexisting with randomly
located wardens and interferers, considering both centralized and distributed antenna …

Encrypted finite-horizon energy-to-peak state estimation for time-varying systems under eavesdropping attacks: Tackling secrecy capacity

L Zou, Z Wang, B Shen, H Dong… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
This paper is concerned with the problem of finite-horizon energy-to-peak state estimation
for a class of networked linear time-varying systems. Due to the inherent vulnerability of …

Physical layer security in millimeter wave cellular networks

C Wang, HM Wang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
Recent studies show that millimeter wave (mmWave) communications can offer orders of
magnitude, which increases in the cellular capacity. However, the secrecy performance of …

Artificial noise assisted secure interference networks with wireless power transfer

N Zhao, Y Cao, FR Yu, Y Chen, M Jin… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Interference alignment (IA) is a remarkable technique to manage interference, and artificial
noise (AN) can be utilized to combat one main threat of security, passive eavesdropping …

Secure transmissions in millimeter wave systems

Y Ju, HM Wang, TX Zheng, Q Yin - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Exploiting millimeter wave is an effective way to meet the data traffic demand in the 5G
wireless communication system. In this paper, we study secure transmissions under slow …

Physical layer security in MIMO backscatter wireless systems

Q Yang, HM Wang, Y Zhang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Backscatter wireless communication is an emerging technique widely used in low-cost and
low-power wireless systems, especially in passive radio frequency identification (RFID) …

Safeguarding millimeter wave communications against randomly located eavesdroppers

Y Ju, HM Wang, TX Zheng, Q Yin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Mm-wave offers a sensible solution to the capacity crunch faced by 5G wireless
communications. This paper comprehensively studies physical layer security in a multi-input …

Secure transmission with large numbers of antennas and finite alphabet inputs

Y Wu, JB Wang, J Wang, R Schober… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we investigate secure transmission over the large-scale multiple-antenna
wiretap channel with finite alphabet inputs. First, we investigate the case where …