Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2023.3237258
Abstract: Unmanned aerial vehicle (UAV) plays an important role in wireless communication systems, due to the additional degree of freedom realized from its flexible deployment. Driven by this advantage and considering the security issue, this paper…
read more here.
Keywords:
suspicious communications;
distributed transmit;
transmit beamforming;
eavesdropping ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2023.3236186
Abstract: Proactive eavesdropping is an effective approach to legitimately surveil the suspicious communications. Current studies all considered that physical layer security (PLS) techniques such as the wiretap coding are not applied by the suspicious users (SUs)…
read more here.
Keywords:
layer security;
suspicious communications;
physical layer;
fading channels ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2022.3223364
Abstract: This paper investigates the wireless surveillance with a legitimate monitor (E) over hybrid automatic repeat request (HARQ) based suspicious communications between a suspicious transmitter (S) and a suspicious destination (D). Specifically, with the HARQ protocol,…
read more here.
Keywords:
suspicious communications;
harq based;
tex math;
based suspicious ... See more keywords