Articles with "eavesdropping via" as a keyword



Photo by jontyson from unsplash

Wireless Information Surveillance Over Multiple Time Slots

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2021.3122821

Abstract: Proactive eavesdropping via joint jamming and relaying has been proposed to improve the legitimate surveillance performance. However, how will it perform over multiple time slots compared to proactive eavesdropping via jamming remains unknown. To answer… read more here.

Keywords: eavesdropping via; proactive eavesdropping; time slots; multiple time ... See more keywords
Photo by osheen_ from unsplash

Proactive Eavesdropping via Jamming in UAV-Enabled Relaying Systems With Statistical CSI

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Signal Processing Letters"

DOI: 10.1109/lsp.2022.3156402

Abstract: We investigate proactive eavesdropping with one half-duplex legitimate monitor (E) in unmanned aerial vehicle (UAV)-enabled suspicious relaying systems, which consist of a suspicious transmitter (ST), a suspicious UAV-based relay (SU) and a suspicious destination (SD).… read more here.

Keywords: relaying systems; eavesdropping via; proactive eavesdropping; via jamming ... See more keywords