A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
Results show that our secure CSI estimation scheme is highly effective in preventing downlink leakage against malicious users. ...
Recently a serious eavesdropping attack, which exploits the CSI feedback of the FDD system, is discovered in MU-MIMO networks. ...
And this is an application of Multi-User MIMO (MU-MIMO) scenario. With advantage of improving the speed and capacity of networks, MU-MIMO has been standardized in IEEE 802.11ac [25] . ...
doi:10.1145/2976749.2978412
dblp:conf/ccs/MaoZZ16
fatcat:qt5shmty4vfhhisvcyfnkfeifu
Overcoming the Channel Estimation Barrier in Massive MIMO Communication Systems
[article]
2019
arXiv
pre-print
This article discusses the application of deep learning (DL) for massive MIMO channel estimation in wireless networks by integrating the underlying characteristics of channels in future high-speed cellular ...
Massive multiple-input multiple-output (MIMO) is one of the critical underlying technologies that allow future wireless networks to meet these service needs. ...
Another key challenge of CSI estimation in massive MIMO systems is pilot contamination, which stems from interference of pilot symbols utilized by the users in neighboring cells. ...
arXiv:1912.10573v1
fatcat:w2dn4os3yngjjkrzx66utzacga
A Generalized Framework on Beamformer Design and CSI Acquisition for Single-Carrier Massive MIMO Systems in Millimeter Wave Channels
[article]
2016
arXiv
pre-print
MIMO systems employing single-carrier (SC) modulation in time division duplex (TDD) mode by exploiting the joint angle-delay domain channel sparsity in millimeter (mm) wave frequencies. ...
is derived for spatially correlated wideband MIMO channels. ...
Instantaneous channel state information (CSI) at BS is essential for massive MIMO transmission, since multi-user precoding at downlink or multi-user decoding at uplink necessitates accurate CSI in order ...
arXiv:1607.01436v1
fatcat:t36geyzukjgajh2koo643s5llq
Intelligent D-Band wireless systems and networks initial designs
2021
Zenodo
In short, the D4.2 provides results on promising AI and ML based methods along with their limitations and potentials that have been investigated in the ARIADNE project. ...
This deliverable gives the results of the ARIADNE project's Task 4.2: Machine Learning based network intelligence. ...
Similarly, in [134] , the authors reported a deep learning compressed sensing (DLCS) algorithm for channel estimation scheme in multi-user (MU) massive MIMO sub-THz systems. ...
doi:10.5281/zenodo.5718378
fatcat:l3rkacgotzazha564nqm6wchiy
Rate-Splitting Multiple Access: Fundamentals, Survey, and Future Research Trends
[article]
2022
arXiv
pre-print
a wide range of network loads (including both underloaded and overloaded regimes) and user channel conditions. ...
Through information and communication theoretic analysis, RSMA has been shown to be optimal (from a Degrees-of-Freedom region perspective) in several transmission scenarios. ...
As the multi-user interference at one user stems from the message of the other user, such a process can be interpreted as partially decoding the interference. ...
arXiv:2201.03192v1
fatcat:e6vlcpge3jdexcqp7e6ctz4xjq
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
, and relay networks. ...
User selection in downlink channels with external eavesdroppers was studied in [102] - [107] . ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. ...
, and relay networks. ...
User selection in downlink channels with external eavesdroppers was studied in [102] - [107] . ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
Downlink Secrecy Rate of One-Bit Massive MIMO System with Active Eavesdropping
2020
IEEE Access
In this study, we consider the physical layer security in the downlink of a Massive MIMO system employing one-bit quantization at the base station (BS). ...
long as the transmit power of eavesdropper is less than that of the legitimate user during channel training. ...
It is well-known that the promising gains of Massive MIMO systems [24] - [27] are affected by pilot contamination [28] , [29] , whether resulting from pilot reuse [28] in multi-cellular networks ...
doi:10.1109/access.2020.2975540
fatcat:nnnw3uyvhrg4fatepbxq6gt5oi
Simultaneous Wireless Information and Power Transfer (SWIPT): Recent Advances and Future Challenges
2018
IEEE Communications Surveys and Tutorials
Within communication networks, the distance from the base station to the device is a critical factor in both information and power transfer. ...
WPT is one of the EH technologies that overcome the aforementioned limitations [8] , where the nodes in the communications network charge their inbuilt batteries from electromagnetic radiation. ...
Additionally, residual Self-Interference (SI) in multi-user MIMO channels has been studied in [85] .
D. ...
doi:10.1109/comst.2017.2783901
fatcat:iw2mg5se4bhzpcqgcdd5dfgaoi
Wireless AI: Enabling an AI-Governed Data Life Cycle
[article]
2020
arXiv
pre-print
Specifically, we first propose a novel Wireless AI architecture that covers five key data-driven AI themes in wireless networks, including Sensing AI, Network Device AI, Access AI, User Device AI and Data-provenance ...
To this end, we present a comprehensive survey of the latest studies in wireless AI from the data-driven perspective. ...
In current frequency division duplexity (FDD) MIMO systems (e.g., long-term evolution Release-8), the downlink CSI is acquired at the user equipment (UE) during the training period and returns to the BS ...
arXiv:2003.00866v1
fatcat:dofctwtag5ewhhzaseeukhtxbe
Modeling and Analysis of Energy Harvesting and Smart Grid-Powered Wireless Communication Networks: A Contemporary Survey
[article]
2019
arXiv
pre-print
The advancements in smart power grid and the advocation of "green communications" have inspired the wireless communication networks to harness energy from ambient environments and operate in an energy-efficient ...
We embark on constrained operation and optimization of different energy harvesting wireless systems, such as point-to-point, multipoint-to-point, multipoint-to-multipoint, multi-hop, and multi-cell systems ...
It is proven in [229] - [231] that integrating SWIPT not only facilitates cooperation among users, but also alleviates the level of self-interference stemming from signal leakage from the output to ...
arXiv:1912.13203v1
fatcat:rhnrbxe5wbd3banrfksuxq4oyy
Optimization-driven Machine Learning for Intelligent Reflecting Surfaces Assisted Wireless Networks
[article]
2020
arXiv
pre-print
Practical challenges still remain mainly due to the demand for a large dataset in offline training and slow convergence in online learning. ...
In this article, we focus on machine learning (ML) approaches for performance maximization in IRS-assisted wireless networks. ...
IRS-Assisted MISO System with Channel Uncertainties We consider a generic IRS-assisted multi-input single-output (MISO) downlink system, where the information transmissions from a multi-antenna access ...
arXiv:2008.12938v1
fatcat:ysrvjwwgufe4za46ryr3vhpisa
Technical Program
2021
2020 IEEE Information Theory Workshop (ITW)
It is shown here to be effective also in assisting the encoder: it achieves the helper capacity on the single-user Gaussian channel, on the multiple-access Gaussian channel, on the Exponential channel, ...
Similarly to the inherent secrecy nature of the classical SK scheme, we show that the proposed scheme is also secure by itself, which indicates that the feedback secrecy capacity of the two-user Gaussian ...
Decoding sequences that stem from multiple transmissions of a codeword over an insertion, deletion, and substitution channel is a critical component of efficient deoxyribonucleic acid (DNA) data storage ...
doi:10.1109/itw46852.2021.9457668
fatcat:j425ygeajrbd5esztbe5zgygty
A Survey of Optimization Approaches for Wireless Physical Layer Security
[article]
2019
arXiv
pre-print
Due to the malicious attacks in wireless networks, physical layer security has attracted increasing concerns from both academia and industry. ...
Because of its importance in security designs, the latter research direction is surveyed in a comprehensive way in this paper. ...
In the downlink, the transmitter transmits confidential messages to the legitimate users while preventing from overhearing of the eavesdroppers. ...
arXiv:1901.07955v1
fatcat:3pb27rlc45c3dmnjgwmjyspvb4
Performance Analysis for Training-Based Multi-Pair Two-Way Full-Duplex Relaying with Massive Antennas
[article]
2016
arXiv
pre-print
This paper considers a multi-pair two-way amplify-and-forward relaying system, where multiple pairs of full-duplex users are served via a full-duplex relay with massive antennas, and the relay adopts maximum-ratio ...
When the number of relay antennas is finite, we derive an approximate sum rate expression which is shown to be a good predictor of the ergodic sum rate, especially in large number of antennas. ...
The model involves both the uplink channels (from users to the receive antenna array of the relay) and the downlink channles (from the transmit antennas of the relay to users). ...
arXiv:1612.04654v1
fatcat:d2vykhm2dzendgyfw6dcex6i6i
« Previous
Showing results 1 — 15 out of 59 results