Search
Now showing items 11-20 of 33
On the Performance of RIS-Assisted Dual-Hop UAV Communication Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In this paper, to further improve the coverage and performance of unmanned aerial vehicle (UAV) communication systems, we propose a reconfigurable intelligent surface (RIS)-assisted UAV scheme where an RIS installed on a ...
Secrecy Outage Performance of Ground-to-Air Communications with Multiple Aerial Eavesdroppers and Its Deep Learning Evaluation
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In this letter, we study the secure information transmission from a ground base station (GBS) to a legitimate unmanned aerial vehicle (UAV) user, in the presence of multiple UAV eavesdroppers. To enhance the secrecy ...
On the Achievable Secrecy Diversity of Cooperative Networks with Untrusted Relays
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
Cooperative relaying is often deployed to enhance the communication reliability (i.e., diversity order) and consequently the end-to-end achievable rate. However, this raises several security concerns when the relays are ...
Self-Energized UAV-Assisted scheme for cooperative wireless relay networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Unmanned aerial vehicles (UAVs) have recently been envisaged as an enabling technology of 5G. UAVs act as an intermediate relay node to facilitate uninterrupted, high quality communication between information sources and ...
On physical layer security of correlated multiantenna cognitive radio receivers
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In limited space scenarios, the antennas in the multiantenna cognitive radio (CR) system are closely spaced and often experience correlation among them. In this work, the secrecy performance of correlated multiantenna CR ...
Capacity enhancement in cognitive radio wireless network with dynamic spectrum access
(
IEEE Computer Society
, 2014 , Conference Paper)
Deployment of femto-cells underlaying the macro-cell has been proven to greatly improve the system capacity and the indoor coverage. However, to successfully deploy this heterogeneous network, the interference among the ...
Full-Duplex Jamming and Interception Analysis of UAV-Based Intrusion Links
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
This letter addresses the evaluation of the performance of a full-duplex (FD) jammer and intercepting node, where the FD node attempts to disrupt the communication link of an intruding unmanned aerial vehicle (UAV). The ...
Secrecy outage analysis over random beamforming transmission with user scheduling: Collusion vs. exclusion
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In this letter, we study the interacting effects of the exclusion zone and eavesdropper colluding strategy on the secrecy performance of multiple-antenna transmission system. In particular, a base station (BS) applies ...
Applications, databases and open computer vision research from drone videos and images: a survey
(
Springer Science and Business Media B.V.
, 2021 , Article)
Analyzing videos and images captured by unmanned aerial vehicles or aerial drones is an emerging application attracting significant attention from researchers in various areas of computer vision. Currently, the major ...
Secrecy Performance Analysis of Multi-Antenna NOMA System with AF/DF relaying under External and Internal Eavesdropping Scenarios
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Due to the successive interference cancellation (SIC) technique, Non orthogonal multiple Access (NOMA) users have the capability of decoding the other paired users sharing the same resource bloc. As a result, NOMA technique ...