J Zhang, C Kundu, OA Dobre… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
We investigate the secrecy performance of an underlay small-cell cognitive radio network under unreliable backhaul connections. The small-cell network shares the same spectrum …
J Liu, Z Liu, Y Zeng, J Ma - IEEE Network, 2016 - ieeexplore.ieee.org
Wireless networks are increasingly being employed to transfer highly sensitive information. Due to the broadcast nature of wireless channels, security issues have been taken as a …
J Tang, H Wen, H Song, K Zeng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) provides strong and lightweight secure communications for vehicle networks, which has attracted great attention. However, current schemes cannot …
S Zhao, Z Lu, Z Luo, Y Liu - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Wireless jamming remains as one of the primary threats towards wireless security. Traditionally, jamming is able to disrupt wireless signals within, but not beyond, its covered …
Z Li, S Le, J Chen, KG Shin, J Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the rapid deployment and wide use of mobile services and applications, more and more sensitive user information is being transmitted wirelessly. Due to the broadcast nature …
B He, J Chen, Y Kuo, L Yang - IET Communications, 2017 - Wiley Online Library
Recently, there are increasing requirements of security in wireless communications, especially for the multiuser systems. In this study, the authors consider the security of two …
Z Li, P Lyu, J Li, Z Chang, J Liu, Z Yan - Digital Communications and …, 2023 - Elsevier
Due to the broadcast nature of wireless communications, users' data transmitted wirelessly is susceptible to security/privacy threats. Meanwhile, as a result of the limitation of spectrum …
Z Li, Y Zhu, KG Shin - 2021 IEEE Global Communications …, 2021 - ieeexplore.ieee.org
With the rapid development of wireless communication technologies, interference management (IM) and security/privacy in data transmission have become critically important …
We consider a network of Internet of Things devices transmitting to an IoT Gateway (IoT- GW). Such communications can potentially be overheard by one or multiple eavesdroppers …