Zobrazeno 1 - 10
of 239
pro vyhledávání: '"Tuan, Hoang Duong"'
Security at the physical layer (PHY) is a salient research topic in wireless systems, and machine learning (ML) is emerging as a powerful tool for providing new data-driven security solutions. Therefore, the application of ML techniques to the PHY se
Externí odkaz:
http://arxiv.org/abs/2305.09748
Universal Domain Adaptation (UniDA) aims to transfer knowledge from a source domain to a target domain without any constraints on label sets. Since both domains may hold private classes, identifying target common samples for domain alignment is an es
Externí odkaz:
http://arxiv.org/abs/2210.17067
The idea of embedding optimization problems into deep neural networks as optimization layers to encode constraints and inductive priors has taken hold in recent years. Most existing methods focus on implicitly differentiating Karush-Kuhn-Tucker (KKT)
Externí odkaz:
http://arxiv.org/abs/2210.01802
Autor:
Hoang, Tiep M., Duong, Trung Q., Tuan, Hoang Duong, Lambotharan, Sangarapillai, Garcia-Palacios, Emi, Nguyen, Long D.
This paper presents a framework for converting wireless signals into structured datasets, which can be fed into machine learning algorithms for the detection of active eavesdropping attacks at the physical layer. More specifically, a wireless communi
Externí odkaz:
http://arxiv.org/abs/2003.01048
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Wireless Communications Letters, 2018
We consider device-to-device (D2D) wireless information and power transfer systems using an unmanned aerial vehicle (UAV) as a relay-assisted node. As the energy capacity and flight time of UAVs is limited, a significant issue in deploying UAV is to
Externí odkaz:
http://arxiv.org/abs/1809.01710
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered. At different levels of
Externí odkaz:
http://arxiv.org/abs/1802.06543
The paper considers two possible approaches, which enable multiple pairs of users to exchange information via multiple multi-antenna relays within one time-slot to save the communication bandwidth in low-latency communications. The first approach is
Externí odkaz:
http://arxiv.org/abs/1712.03756
Considering a multi-user interference network with an eavesdropper, this paper aims at the power allocation to optimize the worst secrecy throughput among the network links or the secure energy efficiency in terms of achieved secrecy throughput per J
Externí odkaz:
http://arxiv.org/abs/1708.07334
The throughput of users with poor channel conditions, such as those at a cell edge, is a bottleneck in wireless systems. A major part of the power budget must be allocated to serve these users in guaranteeing their quality-of-service (QoS) requiremen
Externí odkaz:
http://arxiv.org/abs/1706.01741