Sign Up to like & get
recommendations!
0
Published in 2017 at "International Journal of Electronics"
DOI: 10.1080/00207217.2017.1292557
Abstract: ABSTRACT Wireless networks suffer from battery discharging specially in cooperative communications when multiple relays have an important role but they are energy constrained. To overcome this problem, energy harvesting from radio frequency signals is applied…
read more here.
Keywords:
information;
energy;
multiple antennas;
wireless ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3041680
Abstract: We study a hybrid satellite-terrestrial cognitive network (HSTCN) relying on non-orthogonal multiple access (NOMA) interconnecting a satellite and multiple terrestrial nodes. In this scenario, the long distance communication is achieved by the satellite equipped multiple…
read more here.
Keywords:
secure;
performance;
hybrid satellite;
terrestrial cognitive ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3144979
Abstract: The radar jamming technology has been studied in this paper mainly, which uses the antenna synthetic wave to generate phase distortion at the signal reception to carry out angle measuring jamming, such as traditional cross-eye…
read more here.
Keywords:
phase;
synthetic false;
multiple antennas;
antennas synthetic ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2022.3144325
Abstract: In this letter, a multiple antennas-based truncated channel inversion power control (CIPC) secure transmission scheme with artificial noise (AN) is proposed. Specifically, the transmitter with multiple antennas varies the transmit power as per channel to…
read more here.
Keywords:
secure;
power;
tex math;
inline formula ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Entropy"
DOI: 10.3390/e24081047
Abstract: This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence…
read more here.
Keywords:
adversarial perturbation;
machine learning;
learning nextg;
adversarial machine ... See more keywords