Filters








222 Hits in 6.8 sec

Downlink Cellular Network with a Cooperative Jammer for Secure Transmission Downlink Cellular Network with a Cooperative Jammer for Secure Transmission

Vavuluru Raghavendra, Dr Chandra Sekhar
<i > International Journal of Recent Trends in VLSI </i> &nbsp; <span class="release-stage">unpublished</span>
Fig 3 : 3 Input signal of cellular jammer in jammer frequency 5KHz Fig 4: jamming the output signal of cellular jammer at 1KHz International Journal of Recent Trends in VLSI, Embedded Systems and Signal  ...  Problems in Existing Jammers Envisage a situation where you are essaying to dial 911 and cannot get through because someone has a cell phone jammer with him.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lhqitkiqcvfb3n5dnxogghttbu">fatcat:lhqitkiqcvfb3n5dnxogghttbu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180421104835/http://www.ijvesp.com/Manuscripts/VOL1I22015/IJVESPV1I20019.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/76/5e/765e2b2ca505996d3c666304ffb130c88f2b8fb2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective [article]

Qingqing Wu, Weidong Mei, Rui Zhang
<span title="2019-07-24">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Generally speaking, UAVs can be used as new aerial platforms in the cellular network to provide communication services for terrestrial users, or become new aerial users of the cellular network served by  ...  Motivated by the above, in this article, we aim to identify such new issues from a physical-layer security viewpoint and propose novel solutions to tackle them efficiently.  ...  As shown in Fig. 6(a) , we consider a cellular network where a UAV eavesdropper aims to overhear the downlink communication in a specific cell.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1902.02472v2">arXiv:1902.02472v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cdwfchqw55b2lfl74ff3wn2q3m">fatcat:cdwfchqw55b2lfl74ff3wn2q3m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200928112733/https://arxiv.org/pdf/1902.02472v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ce/31/ce3199a9b629eb2bda6d99b7279ebe86bd278899.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1902.02472v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

UAV-Assisted Attack Prevention, Detection, and Recovery of 5G Networks [article]

Aly Sabri Abdalla, Keith Powell, Vuk Marojevic, Giovanni Geraci
<span title="2020-07-01">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
, and security.  ...  We propose to leverage UAVs in 5G to assist in the prevention, detection, and recovery of attacks on 5G networks.  ...  The research community has been looking into physical layer security approaches to ensure the confidentiality and security of 5G networks [4] [5] . The work presented in [6]  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.00244v1">arXiv:2007.00244v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iapfdl3pqrge3h2f3e3tb4wm6m">fatcat:iapfdl3pqrge3h2f3e3tb4wm6m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200710051209/https://arxiv.org/pdf/2007.00244v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/47/cb/47cb01bc82a7be14658b826d12c5558874a60c23.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.00244v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cooperative Strategies for Wireless-Powered Communications: An Overview [article]

He Chen, Chao Zhai, Yonghui Li, Branka Vucetic
<span title="2017-11-25">2017</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
schemes for cognitive wireless-powered networks, and cooperative jamming strategies towards wireless-powered secure communications.  ...  This article provides an overview of various cooperative strategies for WPC, with particular emphasis on relaying protocols for wireless-powered cooperative communications, cooperative spectrum sharing  ...  Furthermore, concurrent transmissions from enormous MTDs to the core network (e.g., the base station (BS) in cellular networks) can lead to severe radio access network congestion.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1610.03527v2">arXiv:1610.03527v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wblc53vbvzf5hmehfoggtsti5u">fatcat:wblc53vbvzf5hmehfoggtsti5u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200913234211/https://arxiv.org/ftp/arxiv/papers/1610/1610.03527.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/64/31/64314f634a06fc127ef085e5925f0108dc07c7a0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1610.03527v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Table of Contents

<span title="">2016</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fmebo7gm4vhg7ljs3x2bbrazk4" style="color: black;">IEEE Transactions on Vehicular Technology</a> </i> &nbsp;
Leung 6244 Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Zhong 6547 Relay Selection for Cooperative Relaying Networks With Small Buffers . . . . . . . . . . . . . . . S.-L. Lin and K.-H.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvt.2016.2596323">doi:10.1109/tvt.2016.2596323</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hc6khw4qpnherap6r2g6phsfxi">fatcat:hc6khw4qpnherap6r2g6phsfxi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180724021815/https://ieeexplore.ieee.org/ielx7/25/7542099/07542214.pdf?tp=&amp;arnumber=7542214&amp;isnumber=7542099" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/88/0d/880d258be5e04d9a23cb9b68f6b1c44393b4fd3e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvt.2016.2596323"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security

Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xqa4uhvxwvgsbdpllabnuanz6e" style="color: black;">IEEE Transactions on Information Forensics and Security</a> </i> &nbsp;
In this scheme, each potential jammer that has no LoS link to its nearest receiver but may have LoS links to eavesdroppers is selected with a certain probability to generate artificial noise such that  ...  Index Terms-Physical layer security, millimeter-wave ad hoc communications, cooperative jamming.  ...  [18] , downlink transmissions of cellular networks [19] , downlink transmissions of hybrid cellular networks [20] , [21] , where microwave BSs coexist with mmWave BSs, simultaneous wireless information  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2021.3054507">doi:10.1109/tifs.2021.3054507</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/db754gxi2jbxddv7ou4wwpjoba">fatcat:db754gxi2jbxddv7ou4wwpjoba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210201212836/https://ieeexplore.ieee.org/ielx7/10206/4358835/09335641.pdf?tp=&amp;arnumber=9335641&amp;isnumber=4358835&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/53/19/53198ca323072bfe91e6a18e6c483642a4203b25.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2021.3054507"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Cooperative Resource Management for Cognitive Satellite-Aerial-Terrestrial Integrated Networks Towards IoT

Yuhan Ruan, Yongzhao Li, Rui Zhang, Wenchi Cheng, Can Liu
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Then, we propose a cooperative beamforming scheme to facilitate secure and energy-efficient IoT communications under limited energy for open channel environments in cognitive SATINs.  ...  With the ubiquitous deployment of Internet-of-Things (IoT) devices and applications, satelliteaerial-terrestrial integrated network (SATIN) is regarded as a promising candidate to facilitate global IoT  ...  In this case, artificial noise together with beamforming provides a new perspective for enhancing transmission security [42] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2975012">doi:10.1109/access.2020.2975012</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kuplojkifrffxohgmgixyxd2sm">fatcat:kuplojkifrffxohgmgixyxd2sm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201108194821/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09003405.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b3/90/b3909dddf1f8fedafcd427c12cbb71ebe3302b75.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2975012"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Secure Millimeter-Wave Ad Hoc Communications Using Physical Layer Security [article]

Yuanyu Zhang, Yulong Shen, Xiaohong Jiang, Shoji Kasahara
<span title="2020-09-04">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this scheme, each potential jammer that has no LoS link to its nearest receiver but may have LoS links to eavesdroppers is selected with a certain probability to generate artificial noise such that  ...  Millimeter-wave (mmWave) communications are highly promising to improve the capacity of modern wireless networks, while the physical layer security (PLS) techniques hold great potential to enhance the  ...  [18] , downlink transmissions of cellular networks [19] , downlink transmissions of hybrid cellular networks [20] , [21] , where microwave BSs coexist with mmWave BSs, simultaneous wireless information  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2009.01988v1">arXiv:2009.01988v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qq25dfqfsrabbolfs4txyi6ava">fatcat:qq25dfqfsrabbolfs4txyi6ava</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200916165716/https://arxiv.org/pdf/2009.01988v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2009.01988v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Table of Contents

<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fmebo7gm4vhg7ljs3x2bbrazk4" style="color: black;">IEEE Transactions on Vehicular Technology</a> </i> &nbsp;
He 11179 Robust Secure Transmission and Power Transfer in Heterogeneous Networks With Confidential Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Rajan 11926 A Comprehensive Access Point Placement for IoT Data Transmission Through Train-Wayside Communications in Multi-Environment Based Rail Networks . . . . . . . . . . . . . . . . . . . . M.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvt.2020.3027076">doi:10.1109/tvt.2020.3027076</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xns72myvtfhgpjy622lpgmii3i">fatcat:xns72myvtfhgpjy622lpgmii3i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210429102026/https://ieeexplore.ieee.org/ielx7/25/9238536/09238567.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f9/4b/f94bd9bc7f1f4bda44eee5095759dc275b68e730.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvt.2020.3027076"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Secure Satellite-Terrestrial Transmission Over Incumbent Terrestrial Networks via Cooperative Beamforming

Jun Du, Chunxiao Jiang, Haijun Zhang, Xiaodong Wang, Yong Ren, Merouane Debbah
<span title="">2018</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/onirm7ye2bfobnpwuwaopap5yu" style="color: black;">IEEE Journal on Selected Areas in Communications</a> </i> &nbsp;
In this paper, we consider a scenario where the satellite-terrestrial network is overlaid over the legacy cellular network.  ...  The secure communication in this coexistence system of the satellite-terrestrial network and cellular network through the physical layer security techniques is studied in this work.  ...  In this work, we will consider the downlink communication in a coexistence system with FSS terminals and terrestrial cellular networks sharing the same Ka band.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsac.2018.2824623">doi:10.1109/jsac.2018.2824623</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tlmxn5dgefhtzianuf24zvrhxq">fatcat:tlmxn5dgefhtzianuf24zvrhxq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171118021729/http://laneas.com:80/sites/default/files/publications/4223/paper3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3f/b6/3fb6aa0c7940981ef04670cc1d50ff5a1b6c309d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsac.2018.2824623"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Survey of Achieving Efficient Channel Condition using Secure Channel Algorithm in Wireless Networks

M. Balaganesh, D.Balagowri D.Balagowri, P.Sathiya P.Sathiya
<span title="2015-01-16">2015</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
Wireless networking protocols square measure progressively being designed to use a user's measured channel condition.  ...  In a channel-aware protocol, each individual user's reportable channel condition affects the performance of every alternative user.  ...  The scheduler-based attacks in third generation wireless networks are used for measures the quality and performance of the downlink channels in a network.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/19170-0640">doi:10.5120/19170-0640</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wdfu3qjgarb7bhsfskqjhawna4">fatcat:wdfu3qjgarb7bhsfskqjhawna4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722100525/https://research.ijcaonline.org/volume109/number3/pxc3900640.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/25/7d2576fbae9c58985f25cbf4f3601b409ababfbf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/19170-0640"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Wireless Secrecy in Cellular Systems with Infrastructure--Aided Cooperation [article]

Petar Popovski, Osvaldo Simeone
<span title="2008-05-03">2008</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In cellular systems, confidentiality of uplink transmission with respect to eavesdropping terminals can be ensured by creating intentional inteference via scheduling of concurrent downlink transmissions  ...  Overall, the analysis reveals that a combination of scheduling and base station cooperation is a promising means to improve transmission confidentiality in cellular systems.  ...  no modifications on the uplink/ downlink transmissions of a conventional cellular systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0805.0375v1">arXiv:0805.0375v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iq73ysu44jf5zhjvqr3s5dj3ea">fatcat:iq73ysu44jf5zhjvqr3s5dj3ea</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-0805.0375/0805.0375.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/0805.0375v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Table of Contents

<span title="2021-10-04">2021</span> <i title="IEEE"> 2021 IEEE 46th Conference on Local Computer Networks (LCN) </i> &nbsp;
: Scalable and Secure Node Discovery for Overlay Networks 170 Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness Verification 178 MonGNN: A Neuroevolutionary-Based Solution for  ...  Message Scheduling in Mobile Opportunistic Networks 201 An Efficient Metric for Physical-Layer Jammer Detection in Internet of Things Networks 209 Multi-Level Graph Attention Network Based Unsupervised  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcn52139.2021.9524933">doi:10.1109/lcn52139.2021.9524933</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bopsc4l2qrc7bobzfyb6343iou">fatcat:bopsc4l2qrc7bobzfyb6343iou</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210917112416/https://ieeexplore.ieee.org/ielx7/9524874/9524875/09524933.pdf?tp=&amp;arnumber=9524933&amp;isnumber=9524875&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/f5/0ff5077b474ef10774617f36ec94dab25fd5bfa3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcn52139.2021.9524933"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Physical Layer Security in Heterogeneous Networks with Jammer Selection and Full-Duplex Users [article]

Weijun Tang, Suili Feng, Yuehua Ding, Yuan Liu
<span title="2017-09-19">2017</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, we enhance physical layer security for downlink heterogeneous networks (HetNets) by using friendly jammers and full-duplex users.  ...  In particular, the locations of active jammers are modeled by a modified Poisson hole process (PHP).  ...  This work was extended by [12] for the downlink multiple-antenna cellular networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1709.06294v1">arXiv:1709.06294v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wud5gqsd65fhtoymebcrr3gfuu">fatcat:wud5gqsd65fhtoymebcrr3gfuu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200927172524/https://arxiv.org/pdf/1709.06294v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/70/10/70107380f0fcd8c6035ca6f504bb1963bfc032ff.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1709.06294v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Security for 5G Mobile Wireless Networks

Dongfeng Fang, Yi Qian, Rose Qingyang Hu
<span title="">2018</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks.  ...  The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized.  ...  in Fig.12 , cooperation with relay can be used to help the sender to secure the signal transmission.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2017.2779146">doi:10.1109/access.2017.2779146</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yjroccchnbbzbmmlmug4q7ge4q">fatcat:yjroccchnbbzbmmlmug4q7ge4q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720054935/https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1205&amp;context=ece_facpub" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/18/42/1842e0c27aef073034fcd5bf25dc8c48b100d4d9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2017.2779146"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 222 results