Search

Your search keyword '"Physical-layer security"' showing total 791 results

Search Constraints

Start Over You searched for: Descriptor "Physical-layer security" Remove constraint Descriptor: "Physical-layer security" Topic physical-layer security Remove constraint Topic: physical-layer security
791 results on '"Physical-layer security"'

Search Results

6. Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transform.

7. Differential sensing approaches for scattering-based holographic encryption.

8. Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments.

9. Secrecy Offloading Analysis of NOMA-based UAVaided MEC in IoT Networks with Imperfect CSI and SIC.

10. Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions.

11. Enhanced Message Authentication Encryption Scheme Based on Physical- Layer Key Generation in Resource-Limited Internet of Things.

13. On the Secrecy Sum-Rate of Internet of Things Networks: Scheduling and Power Control †.

14. Experimental Evaluation of Network-Controlled Physical-Layer Security Through Friendly Jamming

15. Security Analysis of Integrated HAP-Based FSO and UAV-Enabled RF Downlink Communications

16. Noise-Based Active Defense Strategy for Mitigating Eavesdropping Threats in Internet of Things Environments

17. Dataset Augmentation and Fractional Frequency Offset Compensation Based Radio Frequency Fingerprint Identification in Drone Communications

18. Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions

19. Performance analysis of physical-layer security in mid-infrared FSO communication system.

20. Secrecy and Throughput Performance of Cooperative Cognitive Decode-and-Forward Relaying Vehicular Networks with Direct Links and Poisson Distributed Eavesdroppers.

21. Deep learning approach for physical-layer security in Gaussian multiple access wiretap channel

22. Secure massive MIMO system with two-way relay cooperative transmission in 6G networks

23. Physical Layer Security: Channel Sounding Results for the Multi-Antenna Wiretap Channel.

24. SCIM: Incorporating secure communication and interference management in one operation

25. Security-reliability tradeoff of MIMO TAS/SC networks using harvest-to-jam cooperative jamming methods with random jammer location

26. STBC-Enabled Secure Wireless Transmission With Cooperative Devices Under Imperfect CSI of Destination

27. Physical-Layer Security Improvement in MIMO OFDM Systems Using Multilevel Chaotic Encryption

28. Physical-layer security with frequency diverse array for DF multi-antenna relaying SWIPT system.

29. A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning.

30. Secure massive MIMO system with two-way relay cooperative transmission in 6G networks.

31. 非理想信道状态信息下 RIS 辅助的安全通信.

32. Physical-layer security enhancement using artificial noise for D2D communication in vehicular platooning networks

33. On secrecy performance analysis of multi-antenna STAR-RIS-assisted downlink NOMA systems

34. On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems

35. Secrecy Performance of Multi-RIS-Assisted Wireless Systems.

36. A Robust Scheme for RIS-Assisted UAV Secure Communication in IoT.

37. Deep Q-Learning-Based Buffer-Aided Relay Selection for Reliable and Secure Communications in Two-Hop Wireless Relay Networks.

38. RIS-Enabled Secret Key Generation for Secured Vehicular Communication in the Presence of Denial-of-Service Attacks.

39. Survey of capacity limits and implementation techniques in wireless covert communication

40. On secrecy outage probability for downlink NOMA systems with relay–antenna selection

41. 基于能量采集的友好干扰机辅助下多中继系统安全传输方案.

42. Reconfiguring wireless environments via intelligent surfaces for 6G: reflection, modulation, and security.

43. Physical-Layer Security with Irregular Reconfigurable Intelligent Surfaces for 6G Networks †.

44. Physical-Layer Security in Power-Domain NOMA Based on Different Chaotic Maps.

45. Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers.

46. Impact of Outdated CSI on the Secure Communication in Untrusted In-Band Full-Duplex Relay Networks

47. Rate Splitting in the Presence of Untrusted Users: Outage and Secrecy Outage Performances

48. On secrecy performance analysis of multi-antenna STAR-RIS-assisted downlink NOMA systems.

49. On secrecy performance for IoT enabled SWIPT multi-relaying NOMA systems.

50. Optimizing Training and Transmission Overheads for Secure URLLC Against Randomly Distributed Eavesdroppers.

Catalog

Books, media, physical & digital resources