On the road to 6G: Visions, requirements, key technologies, and testbeds

CX Wang, X You, X Gao, X Zhu, Z Li… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Fifth generation (5G) mobile communication systems have entered the stage of commercial
deployment, providing users with new services, improved user experiences as well as a host …

Securing multiuser underlay cognitive transmissions with hardware impairments and channel estimation errors

P Yan, X Ji, Y Zou, B Li - IEEE Transactions on Cognitive …, 2023 - ieeexplore.ieee.org
We investigate physical-layer security for a multiuser underlay cognitive system with
hardware impairments (HIs) and channel estimation errors (CEEs), which comprises …

Physical layer security in AF-based cooperative SWIPT sensor networks

TN Nguyen, DH Tran, T Van Chien… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
Physical layer security (PLS) with radio frequency (RF) energy harvesting (EH) in wireless
sensor networks has received significant interest as a technology for secure information …

EH Cognitive Network With NOMA: Perspective on Impact of Passive and Active Eavesdropping

P Yan, W Duan, X Ji, G Zhang, B Li… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
This article investigates physical-layer security (PLS) for an energy-harvesting cognitive
network with nonorthogonal multiple access (EHCN-NOMA), where a cognitive base station …

Iterated Filters for Nonlinear Transition Models

A Kullberg, I Skog, G Hendeby - 2023 26th International …, 2023 - ieeexplore.ieee.org
A new class of iterated linearization-based nonlinear filters, dubbed dynamically iterated
filters, is presented. Contrary to regular iterated filters such as the iterated extended Kalman …

Novel noise injection scheme to guarantee zero secrecy outage under imperfect csi

HQ Ta, L Cao, H Oh - Entropy, 2023 - mdpi.com
The paper proposes a novel artificial noise (AN) injection strategy in multiple-input single-
output multiple-antenna-eavesdropper (MISOME) systems under imperfect channel …

Physical-Layer Security for Energy-Harvesting Multiuser Systems Under Hardware Impairments and Channel Estimation Errors

P Yan, X Ji, Y Zou, B Li - IEEE Transactions on Green …, 2023 - ieeexplore.ieee.org
This paper considers a typical system composed of multiple energy-constraint users, a
destination, and a passive eavesdropper who may intercept confidential information. Each …

Intelligent Reflecting Surfaces Assisted Full-Duplex IDMA Communication Network

A Shukla, M Kumar, M Gupta - Wireless Personal Communications, 2023 - Springer
Interleave division multiple access (IDMA), which is based on interleaving sequences, may
be regarded as code domain non orthogonal multiple access (NOMA) and may confront …

AN‐aided full‐duplex secure transmissions under imperfect self‐interference cancellation

TL Cao, LL Nguyen, TT Nguyen… - International Journal …, 2023 - Wiley Online Library
This paper considers a full‐duplex (FD) secure transmission scheme with aid of the artificial
noise deployed at both transmitter and receiver under imperfect self‐interference …

Outage performance comparison of adaptive relaying schemes subject to jamming

VL Dao, S Girs, E Uhlemann - 2023 IEEE 28th International …, 2023 - ieeexplore.ieee.org
Proper relay selection (RS) plays a key role for improving the reliability of wireless networks,
especially in the presence of jamming attacks and/or interferers. In this work, we consider …