In this paper, we propose a novel user scheduling that achieves the optimal multi-user diversity gain in multi-cell uplink networks with multiple eavesdroppers. In the proposed scheduling, each base station (BS) selects a certain user based on two pre-determined thresholds (i.e., scheduling criteria). The first threshold is related to the amount of generating interference of the users to other BSs and the second threshold is related to the maximum amount of information overheard by the eavesdroppers in the network. Simulation results show that the proposed scheduling significantly outperforms the other scheduling algorithms in terms of secrecy throughput. Note that the proposed scheduling can operate with a distributed manner when time divi...
In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a s...
In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink sce...
(MUD) In this paper, we introduce three types of opportunistic interference management strategies in...
In this letter, we consider the uplink wiretap network which consists of a base station, N legitimat...
Opportunistic scheduling schemes are investigated for uplink wiretap channels with multiple asymmetr...
This paper studies the physical-layer security of a multi-user multi-eavesdropper cellular network, ...
This paper investigates physical layer security with opportunistic scheduling in a downlink wireless...
AbstractThis paper studies the physical-layer security of a multi-user multi-eavesdropper cellular n...
To meet the growing demand of mobile data service with limited radio resources, wireless networks ha...
peer reviewedIn this letter, we employ orthogonal random beamforming (ORBF) for the worst-case multi...
Performance of opportunistic scheduling for physical layer security with transmit antenna selection ...
In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of on...
In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a s...
In this paper, we propose a cumulative distribution function (CDF)-based scheduling for multi-cell u...
In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink sce...
In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a s...
In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink sce...
(MUD) In this paper, we introduce three types of opportunistic interference management strategies in...
In this letter, we consider the uplink wiretap network which consists of a base station, N legitimat...
Opportunistic scheduling schemes are investigated for uplink wiretap channels with multiple asymmetr...
This paper studies the physical-layer security of a multi-user multi-eavesdropper cellular network, ...
This paper investigates physical layer security with opportunistic scheduling in a downlink wireless...
AbstractThis paper studies the physical-layer security of a multi-user multi-eavesdropper cellular n...
To meet the growing demand of mobile data service with limited radio resources, wireless networks ha...
peer reviewedIn this letter, we employ orthogonal random beamforming (ORBF) for the worst-case multi...
Performance of opportunistic scheduling for physical layer security with transmit antenna selection ...
In this paper, we address the opportunistic scheduling in multitwo user NOMA system consisting of on...
In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a s...
In this paper, we propose a cumulative distribution function (CDF)-based scheduling for multi-cell u...
In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink sce...
In this paper, we investigate secure communication for a dual-hop multiuser relay network, where a s...
In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink sce...
(MUD) In this paper, we introduce three types of opportunistic interference management strategies in...