×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [104]
北京大学 [46]
山东大学 [34]
软件研究所 [20]
北京航空航天大学 [18]
湖南大学 [13]
更多...
内容类型
期刊论文 [215]
会议论文 [77]
其他 [30]
学位论文 [14]
专著 [2]
会议 [2]
更多...
发表日期
2021 [1]
2019 [15]
2018 [37]
2017 [42]
2016 [56]
2015 [36]
更多...
学科主题
Engineerin... [2]
Computer S... [1]
Computer S... [1]
computer s... [1]
computer s... [1]
engineerin... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共340条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Enhanced Intrusion Detection System for an EH IoT Architecture Using a Cooperative UAV Relay and Friendly UAV Jammer
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 11, 页码: 1786-1799
作者:
Van Nhan Vo
;
Hung Tran
;
Chakchai So-In
收藏
  |  
浏览/下载:181/0
  |  
提交时间:2021/09/03
Detection probability (DP)
energy harvesting (EH)
friendly UAV jammer
Internet of Things (IoT)
system performance
UAV detection
Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks
期刊论文
IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 卷号: 67, 页码: 1254-1267
作者:
Wang, Hui-Ming
;
Zhao, Bing-Qing
;
Zheng, Tong-Xing
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2019/11/19
device-to-device (D2D) communication
stochastic geometry
Physical layer security
full-duplex (FD)
secrecy outage
secrecy throughput
User Selection and Transceiver Design for Secure Transmission in MIMO Interference Networks
会议论文
2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-SPRING), 2019-01-01
作者:
Cao, Qiuyi
;
Zhao, Nan
;
Gui, Guan
;
Cao, Yang
;
Zhang, Shun
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/02
Interference networks
physical layer security
secrecy rate
transceiver design
user selection
Secrecy Analysis for Cooperative NOMA Networks With Multi-Antenna Full-Duplex Relay
期刊论文
IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 卷号: 67, 页码: 5574-5587
作者:
Cao, Yang
;
Zhao, Nan
;
Pan, Gaofeng
;
Chen, Yunfei
;
Fan, Lisheng
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2019/12/02
Beamforming design
full-duplex relay
non-orthogonal multiple access
physical layer security
secrecy outage probability
Secure Transmission for Interference Networks: User Selection and Transceiver Design
期刊论文
IEEE SYSTEMS JOURNAL, 2019, 卷号: 13, 页码: 2839-2850
作者:
Zhao, Nan
;
Cao, Qiuyi
;
Gui, Guan
;
Cao, Yang
;
Zhang, Shun
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/02
Interference networks
multiple-input multiple-output
physical layer security
secrecy rate
transceiver design
user selection
Robust Beamforming and Jamming for Enhancing the Physical Layer Security of Full Duplex Radios
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 期号: 12
作者:
Kong, Zhengmin
;
Yang, Shaoshi
;
Wang, Die
;
Hanzo, Lajos
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
Physical layer security
full-duplex
artificial noise
secrecy beamforming
secrecy rate
An improved mutual authentication protocol based on perfect forward secrecy for satellite communications
期刊论文
International Journal of Satellite Communications and Networking, 2019
作者:
Xu, Shuishuai
;
Liu, Xindong
;
Ma, Mimi
;
Chen, Jianhua
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems
期刊论文
2019 IEEE International Conference on Communications Workshops, ICC Workshops 2019 - Proceedings, 2019
作者:
Jameel, Furqan
;
Khan, Wali Ullah
;
Chang, Zheng
;
Ristaniemi, Tapani
;
Liu, Ju
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/12/11
Decode-and-forward (DF)
Deep learning
Nonorthogonal multiple access (NOMA)
Power-splitting
Physical-layer security of visible light communications with jamming
期刊论文
2019 IEEE/CIC International Conference on Communications in China, ICCC 2019, 2019, 页码: 512-517
作者:
Tian, Dinghui
;
Zhang, Wensheng
;
Sun, Jian
;
Wang, Cheng-Xiang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Jamming
Physical-layer security
Secrecy rate
Visible light communication
Online Scheduling for Multi-Hops Wireless Networks With Security Constraints
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 21409-21419
作者:
Qiuming Liu
;
Changjian Zhu
;
He Xiao
;
Xiaohong Qiu
;
Li Yu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/17
Encoding
Heuristic algorithms
Wireless networks
Spread spectrum communication
Security
Communication system security
Wireless networks
secrecy encoding
network control
Lyapunov optimization
©版权所有 ©2017 CSpace - Powered by
CSpace