NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 607
1.
  • A Comprehensive Survey on C... A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
    Jameel, Furqan; Wyne, Shurjeel; Kaddoum, Georges ... IEEE Communications surveys and tutorials, 01/2019, Letnik: 21, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between ...
Celotno besedilo

PDF
2.
  • UAV-Enabled Communication U... UAV-Enabled Communication Using NOMA
    Nasir, Ali Arshad; Tuan, Hoang Duong; Duong, Trung Q. ... IEEE transactions on communications, 07/2019, Letnik: 67, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Unmanned aerial vehicles (UAVs) can be deployed as flying base stations (BSs) to leverage the strength of line-of-sight connections and effectively support the coverage and throughput of wireless ...
Celotno besedilo

PDF
3.
  • On the Total Energy Efficie... On the Total Energy Efficiency of Cell-Free Massive MIMO
    Ngo, Hien Quoc; Tran, Le-Nam; Duong, Trung Q. ... IEEE transactions on green communications and networking, 03/2018, Letnik: 2, Številka: 1
    Journal Article
    Odprti dostop

    We consider the cell-free massive multiple-input multiple-output (MIMO) downlink, where a very large number of distributed multiple-antenna access points (APs) serve many single-antenna users in the ...
Celotno besedilo

PDF
4.
  • Key Generation From Wireles... Key Generation From Wireless Channels: A Review
    Junqing Zhang; Duong, Trung Q.; Marshall, Alan ... IEEE access, 2016, Letnik: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Key generation from the randomness of wireless channels is a promising alternative to public key cryptography for the establishment of cryptographic keys between any two users. This paper reviews the ...
Celotno besedilo

PDF
5.
  • Secure D2D Communication in... Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model
    Yuanwei Liu; Lifeng Wang; Raza Zaidi, Syed Ali ... IEEE transactions on communications, 2016-Jan., 2016-1-00, 20160101, Letnik: 64, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from ...
Celotno besedilo

PDF
6.
  • Outdated Access Point Selec... Outdated Access Point Selection for Mobile Edge Computing With Cochannel Interference
    Lai, Xiazhi; Xia, Junjuan; Fan, Lisheng ... IEEE transactions on vehicular technology, 07/2022, Letnik: 71, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we investigate a mobile edge computing (MEC) network, where the user has some computational tasks to be assisted by multiple computational access points (CAPs) through offloading. We ...
Celotno besedilo
7.
  • Beamforming Optimization fo... Beamforming Optimization for Physical Layer Security in MISO Wireless Networks
    Zhichao Sheng; Hoang Duong Tuan; Duong, Trung Q. ... IEEE transactions on signal processing, 07/2018, Letnik: 66, Številka: 14
    Journal Article
    Recenzirano
    Odprti dostop

    A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas, while the users and eavesdropper are equipped with a ...
Celotno besedilo

PDF
8.
  • Spectral and Energy Efficie... Spectral and Energy Efficiencies in Full-Duplex Wireless Information and Power Transfer
    Van-Dinh Nguyen; Duong, Trung Q.; Hoang Duong Tuan ... IEEE transactions on communications, 05/2017, Letnik: 65, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    A communication system is considered consisting of a full-duplex multiple-antenna base station (BS) and multiple single-antenna downlink users (DLUs) and single-antenna uplink users (ULUs), where the ...
Celotno besedilo

PDF
9.
  • Joint Design of Reconfigura... Joint Design of Reconfigurable Intelligent Surfaces and Transmit Beamforming Under Proper and Improper Gaussian Signaling
    Yu, Hongwen; Tuan, Hoang Duong; Nasir, Ali Arshad ... IEEE journal on selected areas in communications, 11/2020, Letnik: 38, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    This paper considers a network consisting of a multiple antenna array access point serving multiple single antenna downlink users with the assistance of a reconfigurable intelligent surface (RIS). ...
Celotno besedilo

PDF
10.
  • Cell-Free Massive MIMO Netw... Cell-Free Massive MIMO Networks: Optimal Power Control Against Active Eavesdropping
    Hoang, Tiep M.; Hien Quoc Ngo; Duong, Trung Q. ... IEEE transactions on communications, 10/2018, Letnik: 66, Številka: 10
    Journal Article
    Recenzirano
    Odprti dostop

    This paper studies the security aspect of a recently introduced "cell-free massive MIMO" network under a pilot spoofing attack. First, a simple method to recognize the presence of this type of an ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 607

Nalaganje filtrov