Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Gongchao Su"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 4, Pp 102047- (2024)
Integrating unmanned aerial vehicles (UAVs) with wireless systems is widely anticipated to bring enormous benefits to network users, and is considered as a key enabling technology for next generation wireless networks. However deployment of UAVs rais
Externí odkaz:
https://doaj.org/article/08e96d161e1a4afc987048963bea059a
Publikováno v:
IET Information Security, Vol 17, Iss 2, Pp 255-268 (2023)
Abstract Private information retrieval (PIR) means a user retrieves a file while revealing no information on which file is being retrieved. In classic PIR, the user needs to wait for the responses of all the storage nodes. However, in general, there
Externí odkaz:
https://doaj.org/article/72d9c1d002814a5ba7867b8d6ad76188
Publikováno v:
IET Communications. 16:695-709
Publikováno v:
2022 31st Wireless and Optical Communications Conference (WOCC).
Publikováno v:
2022 31st Wireless and Optical Communications Conference (WOCC).
Publikováno v:
2022 IEEE 5th International Conference on Electronics Technology (ICET).
Publikováno v:
IEEE Transactions on Industrial Informatics. 16:5497-5504
For one moving Internet of Things (IoT) collector to download files from nearby industrial IoT devices, storing network coded files into multiple IoT devices can achieve good reliability performance if the following $(n, k)$ erasure property (EP) is
Publikováno v:
WOCC
Unmanned aerial vehicle (UAV) communication is recognized as a promising technology in next generation wireless communication system. As air-to-ground (A2G) communication is vulnerable to eavesdropping attacks by malicious ground adversaries, UAV com
Publikováno v:
IEEE Internet of Things Journal. 6:10519-10533
The proliferation of Internet of Things (IoT) systems provides us a formidable way to monitor a multitude of things by recording field data and delivering it to the faraway controlling center. However, in hostile or inaccessible areas without infrast
Publikováno v:
2021 IEEE 4th International Conference on Electronics Technology (ICET).
This paper studies the physical layer security problem in the downlink two-tier femtocell network system, where an eavesdropper wiretaps the legitimate macrocell users. In this system, femtocell base stations (FBSs) can reduce the performance of eave