Articles with "channel aware" as a keyword



Photo from wikipedia

Channel-Aware Key Generation Under Wireless Fading Environment

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2020.2989557

Abstract: This letter studies a channel-aware source-channel (CASC) key generation approach. Specifically, when the estimated legitimate channel is in good condition, the existing channel-model-based key generation is adopted where the transmitter sends a key to the… read more here.

Keywords: channel aware; generation; key generation; wireless fading ... See more keywords
Photo by guillediaz from unsplash

Dynamic Channel-Aware Subgraph Interactive Networks for Skeleton-Based Action Recognition

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2022.3227816

Abstract: Skeleton-based action recognition has obtained remarkable success due to the rapid development of Graph Neural Networks (GNNs). Existing skeleton-based methods primarily focus on the spatial aspect of skeleton graphs, but rarely mine long-range temporal relationships… read more here.

Keywords: aware subgraph; dynamic channel; action recognition; channel aware ... See more keywords
Photo from wikipedia

Turing Meets Shannon: On the Algorithmic Construction of Channel-Aware Codes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2022.3146298

Abstract: A capacity result involves two parts: achievability and converse. The achievability proof is usually non-constructive and only the existence of capacity-achieving codes is shown invoking probabilistic techniques. Recently, capacity-achieving codes have been found for several… read more here.

Keywords: channel aware; capacity achieving; construction; capacity ... See more keywords
Photo by hudsoncrafted from unsplash

On Channel-Aware Secure HARQ-IR

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2016.2613846

Abstract: In this paper, we study secure hybrid automatic retransmission request (HARQ) over block-fading channels when the channel from a legitimate transmitter (i.e., Alice) to an eavesdropper (i.e., Eve) is less noisy than that to a… read more here.

Keywords: secure harq; aware secure; harq; bob ... See more keywords
Photo by hudsoncrafted from unsplash

Scalable and Secure Dynamic Key Management and Channel Aware Routing in Mobile Adhoc Networks

Sign Up to like & get
recommendations!
Published in 2018 at "Indonesian Journal of Electrical Engineering and Informatics"

DOI: 10.11591/ijeei.v6i1.392

Abstract: A MANET (Mobile Ad-hoc Network) is an infrastructure-less self configuring wireless networks of routers. Key management is at the center of providing network security via cryptographic mechanisms with a high-availability feature. Dynamic key is the… read more here.

Keywords: key management; channel aware; aware routing; dynamic key ... See more keywords