Search
Now showing items 21-30 of 70
Robust secret key extraction from channel secondary random process
(
John Wiley and Sons Ltd
, 2016 , Conference Paper)
The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ...
Deep Reinforcement Learning Algorithm for Smart Data Compression under NOMA-Uplink Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
One of the highly promising radio access strategies for enhancing performance in the next generation cellular communications is non-orthogonal multiple access (NOMA). NOMA offers a number of advantages including better ...
Power-optimal feedback-based random spectrum access for an energy harvesting cognitive user
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, we study and analyze cognitive radio networks in which secondary users (SUs) are equipped with energy harvesting (EH) capability. We design a random spectrum sensing and access protocol for the SU that ...
Characterization of the indoor-outdoor radio propagation channel at 2.4 GHz
(
IEEE
, 2011 , Conference Paper)
We present the site-specific signal strength measurement results for path loss, shadowing, and fading in 2.4GHz band under typical harsh environment (high temperature 4050 C and humidity 8090%). We use spectrum analyzer ...
Secret key generation based on channel and distance measurements
(
IEEE Computer Society
, 2014 , Conference Paper)
Within the paradigm of physical layer secrecy, typically a physical layer specific characteristic is used as key generator to guarantee information hiding from eavesdroppers. In this paper, we propose a novel secret key ...
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We investigate the secure degrees of freedom (SDoF) of the wiretap and the K user Gaussian broadcast channels with multiple antennas at the transmitter, the legitimate receivers and an unknown number of eavesdroppers each ...
Optimal spectrum access for a rechargeable cognitive radio user based on energy buffer state
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ...
Deep Learning for RF-Based Drone Detection and Identification: A Multi-Channel 1-D Convolutional Neural Networks Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Commercial unmanned aerial vehicles, or drones, are getting increasingly popular in the last few years. The fact that these drones are highly accessible to public may bring a range of security and technical issues to ...
Channel secondary random process for robust secret key generation
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
Estimating the number of sources: An efficient maximization approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Estimating the number of sources received by an antenna array have been well known and investigated since the starting of array signal processing. Accurate estimation of such parameter is critical in many applications that ...