We study the physical-layer security of a cognitive radio system in the face of multiple eavesdroppers (EDs), which is composed of a secondary base station (SBS), multiple secondary users (SUs) as well as a pair of primary transmitter (PT) and primary receiver (PR), where the SUs first harvest energy from their received radio frequency signals transmitted by the PT and then communicate with the SBS relying on opportunistic scheduling. We consider two specific user scheduling schemes, namely, the channel-aware user scheduling (CaUS) and the energy-aware user scheduling (EaUS). In the CaUS scheme, an SU having the best instantaneous SU-SBS link (spanning from SUs to SBS) will be activated to communicate with the SBS. By contrast, the EaUS sch...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
In this paper, we investigate the physical-layer security in an energy-harvesting (EH) multiuser net...
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CB...
In this paper, we investigate the physical-layer security of a multi-user multi-eavesdropper cogniti...
In this paper, we study energy harvesting cognitive radio networks (CRNs) in the presence of multipl...
In this paper, we study energy harvesting cognitive radio networks (CRNs) in the presence of multipl...
Covert communication provides high-level security for protecting users’privacy information. In this ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harve...
In this paper, we consider a secondary network with simultaneous wireless information and power tran...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...
In this paper, we investigate the physical-layer security in an energy-harvesting (EH) multiuser net...
In this paper, we consider a cognitive radio network that consists of one cognitive base station (CB...
In this paper, we investigate the physical-layer security of a multi-user multi-eavesdropper cogniti...
In this paper, we study energy harvesting cognitive radio networks (CRNs) in the presence of multipl...
In this paper, we study energy harvesting cognitive radio networks (CRNs) in the presence of multipl...
Covert communication provides high-level security for protecting users’privacy information. In this ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
This paper investigates the problem of secure and reliable communications for cognitive radio networ...
In this paper, we consider a secrecy wireless-powered cognitive radio network, where an energy harve...
In this paper, we consider a secondary network with simultaneous wireless information and power tran...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we investigate the physical-layer security of a secure communication in single-input ...
In this paper, we consider a spectrum sharing cognitive radio network where a secondary user (SU) tr...