Articles with "untrusted user" as a keyword



Photo from wikipedia

Security Enhancement for STARS with An Untrusted User

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2023.3276791

Abstract: —A secure transmission framework is proposed for simultaneously transmitting and reflecting surface (STARS) net- works in presence of an untrusted user. The active and passive secure beamforming optimization problem is addressed. A double- loop alternating… read more here.

Keywords: security enhancement; stars untrusted; untrusted user; enhancement stars ... See more keywords
Photo from wikipedia

Outage Analysis of Rate Splitting Networks With an Untrusted User

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2022.3209794

Abstract: Rate splitting (RS) can significantly improve the spectrum efficiency and degrees of freedom of multi-access transmissions. However, due to the characteristics of RS decoding, the secure transmission remains a challenge especially when there is an… read more here.

Keywords: outage; analysis rate; untrusted user; rate ... See more keywords