In a wiretap channel system model, the jammer node adopts the energy-harvesting signal as artificial noise (jamming signal) against the cooperative eavesdroppers. There are two eavesdroppers in the wiretap channel: eavesdropper E1 is located near the transmitter and eavesdropper E2 is located near the jammer. The eavesdroppers are equipped with multiple antennas and employ the iterative block decision feedback equalization decoder to estimate the received signal, i.e., information signal at E1 and jamming signal at E2. It is assumed that E1 has the channel state information (CSI) of the channel between transmitter and E1, and similarly, E2 has the CSI of channel between jammer and E2. The eavesdroppers establish communication link between t...
We address the physical layer security question of whether a multiple antenna receiver can enhance t...
This work investigates the secrecy capability of energy harvesting based overlay cognitive networks ...
With the rapid development of wireless communications, security becomes extremely important. In man...
Grant No. 19-37-50083\19This article is focused on implementing simultaneous wireless information an...
This paper analyzes the secrecy performance of a reconfigurable intelligent surface (RIS) assisted w...
This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna amplify-...
In this paper, a novel wireless energy harvesting cooperative jammer (EH-CJ)-aided transmission sche...
Interference in wireless networks degrades the signal quality at the terminals. However, it can pote...
In this work, we investigate the performance analysis of a device-to-device (D2D) communication netw...
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication ...
© 2018 IEEE. We consider a multi-link interference network that is tapped by an external eavesdroppe...
© 2002-2012 IEEE. Considering a multi-user interference network with an eavesdropper, this paper aim...
Abstract—We study the Gaussian MIMO wiretap channel with a transmitter, a legitimate receiver, an ea...
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power tra...
© 2016 IEEE. In this paper, we expand the scope of PHY-layer security by investigating TX-based frie...
We address the physical layer security question of whether a multiple antenna receiver can enhance t...
This work investigates the secrecy capability of energy harvesting based overlay cognitive networks ...
With the rapid development of wireless communications, security becomes extremely important. In man...
Grant No. 19-37-50083\19This article is focused on implementing simultaneous wireless information an...
This paper analyzes the secrecy performance of a reconfigurable intelligent surface (RIS) assisted w...
This paper studies the use of multi-antenna harvest-and-jam (HJ) helpers in a multi-antenna amplify-...
In this paper, a novel wireless energy harvesting cooperative jammer (EH-CJ)-aided transmission sche...
Interference in wireless networks degrades the signal quality at the terminals. However, it can pote...
In this work, we investigate the performance analysis of a device-to-device (D2D) communication netw...
In this paper, we propose to use a wireless-powered friendly jammer to enable secure communication ...
© 2018 IEEE. We consider a multi-link interference network that is tapped by an external eavesdroppe...
© 2002-2012 IEEE. Considering a multi-user interference network with an eavesdropper, this paper aim...
Abstract—We study the Gaussian MIMO wiretap channel with a transmitter, a legitimate receiver, an ea...
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power tra...
© 2016 IEEE. In this paper, we expand the scope of PHY-layer security by investigating TX-based frie...
We address the physical layer security question of whether a multiple antenna receiver can enhance t...
This work investigates the secrecy capability of energy harvesting based overlay cognitive networks ...
With the rapid development of wireless communications, security becomes extremely important. In man...