Covert surveillance via proactive eavesdropping under channel uncertainty

Z Cheng, J Si, Z Li, L Guan, Y Zhao… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Surveillance performance is studied for a wireless eavesdropping system, where a full-
duplex legitimate monitor eavesdrops a suspicious user's link with artificial noise (AN) …

Delay-aware secure transmission in MEC-enabled multicast network

Q Xu, P Ren - 2020 IEEE/CIC International Conference on …, 2020 - ieeexplore.ieee.org
This paper studies the joint precoding design and computation offloading in a mobile-edge-
computing-enabled (MEC-enabled) multicast communication network. Physical layer …

Channel-aware key generation under wireless fading environment

Q Xu, P Ren - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter studies a channel-aware source-channel (CASC) key generation approach.
Specifically, when the estimated legitimate channel is in good condition, the existing …