Search
Now showing items 11-19 of 19
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...
Secret key generation based on AoA estimation for low SNR conditions
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable ...
Comparative simulation for physical layer key generation methods
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ...
On spectrum sharing between energy harvesting cognitive radio users and primary users
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ...
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
(
Elsevier B.V.
, 2019 , Article)
The omnipresence of unmanned aerial vehicles, or drones, among civilians can lead to technical, security, and public safety issues that need to be addressed, regulated and prevented. Security agencies are in continuous ...
DroneRF dataset: A dataset of drones for RF-based detection, classification and identification
(
Elsevier Inc.
, 2019 , Article)
Modern technology has pushed us into the information age, making it easier to generate and record vast quantities of new data. Datasets can help in analyzing the situation to give a better understanding, and more importantly, ...
A simple cross correlation switched beam system (XSBS) for angle of arrival estimation
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
We propose a practical, simple and hardware friendly, yet novel and efficient, angle of arrival (AoA) estimation system. Our intuitive, two-phases cross-correlation-based system requires a switched beam antenna array with ...
Classification for Imperfect EEG Epileptic Seizure in IoT applications: A Comparative Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Epileptic seizure detection could be detected through investigating the electroencephalography (EEG), which is deemed to be very important for IoT wearable sensor-based health systems. EEG-based classification is crucial ...