Optimizing the operation cost for UAV-aided mobile edge computing

L Zhang, N Ansari - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
Mobile edge computing (MEC) is leveraged to reduce the latency for the computation-
intensive and latency-critical tasks offloaded from wireless devices and Internet of Things …

Performance analysis of clustering car-following V2X system with wireless power transfer and massive connections

DT Do, MS Van Nguyen, M Voznak… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the rapid growth of vehicles, the vehicular networks meet main challenges such as
dynamic, heterogeneous, and large scaled. In addition, the cellular-based vehicular …

[HTML][HTML] Security-reliability tradeoff for friendly jammer aided multiuser scheduling in energy harvesting communications

X Jiang, P Li, B Li, Y Zou, R Wang - Security and Communication …, 2021 - hindawi.com
In this paper, we investigate the physical-layer security in an energy-harvesting (EH)
multiuser network with the help of a friendly jammer (J), where multiple eavesdroppers are …

Intelligent jamming strategies for secure spectrum sharing systems

X Jiang, P Li, B Li, Y Zou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates the secrecy performance of a spectrum sharing network, where ${N}
$ legitimate source-destination pairs orderly access the shared spectrum for communication …

Capacity Analysis of Power Beacon-Assisted Energy Harvesting MIMO System Over Shadowed Fading Channels

J Yang, X Wu, KP Peppas… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, novel ergodic capacity (EC) performance evaluation results of a power beacon
(PB)-assisted multi-input multi-output (MIMO) wireless powered communication network are …

Ai-based secure NOMA and cognitive radio-enabled green communications: Channel state information and battery value uncertainties

S Sheikhzadeh, M Pourghasemian… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, the security-aware robust resource allocation in energy harvesting cognitive
radio networks is considered with cooperation between two transmitters while there are …

Physical Layer Security for Cognitive Multiuser Networks With Hardware Impairments and Channel Estimation Errors

X Jiang, P Li, Y Zou, B Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate the physical layer security for a cognitive multiuser network
which is composed of multiple cognitive sources, a cognitive destination and an …

Secrecy performance of transmit antenna selection for underlay MIMO cognitive radio relay networks with energy harvesting

X Jiang, P Li, B Li, Y Zou, R Wang - IET Communications, 2022 - Wiley Online Library
In this paper, the secrecy performance in a MIMO cognitive radio (CR) relay network with
energy harvesting (EH) and transmit antenna selection/maximal ratio combining (TAS/MRC) …

Power splitting and source-relay selection in energy harvesting wireless network

X Jiang, P Li, R Wang - Wireless Personal Communications, 2022 - Springer
This paper investigates the performance of an energy-harvesting (EH) relay network, where
multiple sources communicate with a destination via multiple EH decode-and-forward (DF) …

Network-coding-based jamming with triple transmission time slots: A method to secure transmission in an extreme case of source-wiretapping and unshared jamming …

T Tran - EAI Endorsed Transactions on Industrial Networks and …, 2021 - eudl.eu
This article resolves an extreme case in physical layer security: an eavesdropper, located
near to a source, can spy on the jamming-seed if it is just cryptographically shared. The …