X Lai, L Fan, X Lei, Y Deng… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this paper, we investigate a secure mobile edge computing (MEC) network in the presence of multiple eavesdroppers, where multiple users can offload parts of their tasks to …
In this paper, we investigate a mobile edge computing (MEC) network with two computational access points (CAPs), where the source is equipped with multiple antennas …
In this paper, we propose secure relaying transmission protocols using rateless codes, where a source sends encoded packets to two intended destinations via help of …
In this paper, a learning-aided content-based image transmission scheme is proposed, where a multi-antenna source wishes to securely deliver an image to a legitimate …
In this paper, a content-aware medical image transmission scheme is investigated over a multiple-input single-output (MISO) channel in wireless healthcare systems. The multi …
C Feng, L Sun - 2022 IEEE 95th Vehicular Technology …, 2022 - ieeexplore.ieee.org
Physical layer encryption is a promising solution to provide transmission security for Internet- of-Things (IoT). To realize physical layer encryption, channel state information (CSI) as a …
In this paper, we propose and evaluate the performance of fountain codes (FCs) based secure transmission protocols in multiple-input-multiple-output (MIMO) wireless systems, in …
S Jain, R Bose - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Integrating the Internet-of-Things (IoT) paradigm with industrial wireless sensor networks (IWSNs) has led to a technological evolution known as Industrial IoT (IIoT). To ensure …
H Zhang, D Zhai - IEEE Access, 2024 - ieeexplore.ieee.org
Influenced by the special physical characteristics of the plasma sheath and the parameters of the aircraft's attitude, the channel containing the plasma sheath can be regarded as a …