P Yan, X Ji, Y Zou, B Li - IEEE Transactions on Cognitive …, 2023 - ieeexplore.ieee.org
We investigate physical-layer security for a multiuser underlay cognitive system with hardware impairments (HIs) and channel estimation errors (CEEs), which comprises …
Physical layer security (PLS) with radio frequency (RF) energy harvesting (EH) in wireless sensor networks has received significant interest as a technology for secure information …
P Yan, W Duan, X Ji, G Zhang, B Li… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
This article investigates physical-layer security (PLS) for an energy-harvesting cognitive network with nonorthogonal multiple access (EHCN-NOMA), where a cognitive base station …
A new class of iterated linearization-based nonlinear filters, dubbed dynamically iterated filters, is presented. Contrary to regular iterated filters such as the iterated extended Kalman …
The paper proposes a novel artificial noise (AN) injection strategy in multiple-input single- output multiple-antenna-eavesdropper (MISOME) systems under imperfect channel …
P Yan, X Ji, Y Zou, B Li - IEEE Transactions on Green …, 2023 - ieeexplore.ieee.org
This paper considers a typical system composed of multiple energy-constraint users, a destination, and a passive eavesdropper who may intercept confidential information. Each …
Interleave division multiple access (IDMA), which is based on interleaving sequences, may be regarded as code domain non orthogonal multiple access (NOMA) and may confront …
This paper considers a full‐duplex (FD) secure transmission scheme with aid of the artificial noise deployed at both transmitter and receiver under imperfect self‐interference …
Proper relay selection (RS) plays a key role for improving the reliability of wireless networks, especially in the presence of jamming attacks and/or interferers. In this work, we consider …