Protecting secure communication under UAV smart attack with imperfect channel estimation

C Li, Y Xu, J Xia, J Zhao - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate a secure communication system, where one transmitter sends
some confidential message to one receiver, under the smart attack from one unmanned …

Subcarrier allocation based simultaneous wireless information and power transfer algorithm in 5G cooperative OFDM communication systems

Z Na, Y Wang, X Li, J Xia, X Liu, M Xiong, W Lu - Physical communication, 2018 - Elsevier
Self-sustainable communications are highly vital for large amounts of mobile terminals in the
Fifth Generation (5G) communication systems. Simultaneous Wireless Information and …

On physical-layer security in multiuser visible light communication systems with non-orthogonal multiple access

X Zhao, H Chen, J Sun - IEEE Access, 2018 - ieeexplore.ieee.org
In order to improve the security performance of multiuser visible light communication (VLC)
and facilitate the secure application of optical wireless communication technology in Internet …

Performance analysis of full-duplex decode-and-forward relay system with energy harvesting over Nakagami-m fading channels

BC Nguyen, TM Hoang, PT Tran - AEU-International Journal of Electronics …, 2019 - Elsevier
In this paper, we analyze the performance of the full-duplex relay system, wherein two
terminal nodes operate in the half-duplex mode and the relay node with decode-and …

Joint offloading design and bandwidth allocation for ris-aided multiuser mec networks

C Ge, Y Rao, J Ou, C Fan, J Ou, D Fan - Physical Communication, 2022 - Elsevier
This article examines a multiuser intelligent reflecting surface (RIS) aided mobile edge
computing (MEC) system, where multiple edge nodes (ENs) with powerful calculating …

Hybrid ambient backscatter communication systems with harvest-then-transmit protocols

D Li, W Peng, YC Liang - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate and analyze a hybrid ambient backscatter (AmBack) scheme
with harvest-then-transmit protocols. In this scheme, the whole transmission is divided into …

Secure probabilistic caching in random multi-user multi-UAV relay networks

F Shi, J Xia, Z Na, X Liu, Y Ding, Z Wang - Physical Communication, 2019 - Elsevier
In this paper, we investigate the system model of random multi-user multi-UAV relay
networks, where the transmission can be overheard by multiple eavesdroppers. We …

Green communication for NOMA-based CRAN

W Hao, Z Chu, F Zhou, S Yang, G Sun… - IEEE Internet of things …, 2018 - ieeexplore.ieee.org
The number of wireless devices is growing rapidly on a daily basis echoing the increasing
number of applications of the Internet of Thing. Facing massive connections and …

UAV‐Aided Multiuser Mobile Edge Computing Networks with Energy Harvesting

C Wang, W Yu, F Zhu, J Ou, C Fan… - … and Mobile Computing, 2022 - Wiley Online Library
This article studies a mobile edge computing (MEC) with one edge node (EN), where
multiple unmanned aerial vehicles (UAVs) act as users which have some heavy tasks. As …

The multi-objective deployment optimization of UAV-mounted cache-enabled base stations

H Dai, H Zhang, B Wang, L Yang - Physical Communication, 2019 - Elsevier
The deployment of unmanned aerial vehicle (UAV)-mounted base stations is emerging as
an effective solution for providing wireless communication service to ground terminals (GTs) …