Zobrazeno 1 - 10
of 739
pro vyhledávání: '"Pan, Gaofeng"'
Mobile edge computing (MEC) technology can reduce user latency and energy consumption by offloading computationally intensive tasks to the edge servers. Unmanned aerial vehicles (UAVs) and non-orthogonal multiple access (NOMA) technology enable the M
Externí odkaz:
http://arxiv.org/abs/2409.08579
Wireless relays can effectively extend the transmission range of information. However, if relay technology is utilized unlawfully, it can amplify potential harm. Effectively surveilling illegitimate relay links poses a challenging problem. Unmanned a
Externí odkaz:
http://arxiv.org/abs/2407.07314
This work studies the beamforming design in the joint target sensing and proactive eavesdropping (JTSAPE) system. The JTSAPE base station (BS) receives the information transmitted by the illegal transmitter and transmits the waveform for target sensi
Externí odkaz:
http://arxiv.org/abs/2407.06521
In this work, a delay-tolerant unmanned aerial vehicle (UAV) relayed covert and secure communication framework is investigated. In this framework, a legitimate UAV serves as an aerial relay to realize communication when the direct link between the te
Externí odkaz:
http://arxiv.org/abs/2406.06842
Autor:
Lei, Hongjiang, Meng, Dongyang, Ran, Haoxiang, Park, Ki-Hong, Pan, Gaofeng, Alouini, Mohamed-Slim
Unmanned aerial vehicles (UAVs) play an essential role in future wireless communication networks due to their high mobility, low cost, and on-demand deployment. In air-to-ground links, UAVs are widely used to enhance the performance of wireless commu
Externí odkaz:
http://arxiv.org/abs/2406.05936
Unmanned aerial vehicles (UAVs) have been attracting significant attention because there is a high probability of line-of-sight links being obtained between them and terrestrial nodes in high-rise urban areas. In this work, we investigate cognitive r
Externí odkaz:
http://arxiv.org/abs/2406.01313
Autor:
Lei, Hongjiang, Zhou, Sha, Chen, Xinhu, Ansari, Imran Shafique, Li, Yun, Pan, Gaofeng, Alouini, Mohamed-Slim
This work considers a multiple-input-single-output mmWave RSMA system wherein a base station serves two users in the presence of a passive eavesdropper. Different eavesdropping scenarios are considered corresponding to the overlapped resolvable paths
Externí odkaz:
http://arxiv.org/abs/2402.02344
This letter investigates the secure delivery performance of the rate-splitting multiple access scheme in land mobile satellite (LMS) systems, considering that the private messages intended by a terminal can be eavesdropped by any others from the broa
Externí odkaz:
http://arxiv.org/abs/2311.06825
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert com
Externí odkaz:
http://arxiv.org/abs/2310.13932
Autor:
Lei, Hongjiang, Jiang, Jiacheng, Yang, Haosi, Park, Ki-Hong, Ansari, Imran Shafique, Pan, Gaofeng, Alouini, Mohamed-Slim
Unmanned aerial vehicles (UAVs) can provide wireless access services to terrestrial users without geographical limitations and will become an essential part of the future communication system. However, the openness of wireless channels and the mobili
Externí odkaz:
http://arxiv.org/abs/2310.13931