×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [23]
北京大学 [15]
软件研究所 [12]
清华大学 [8]
北京航空航天大学 [6]
西安交通大学 [5]
更多...
内容类型
期刊论文 [57]
会议论文 [18]
其他 [7]
学位论文 [1]
发表日期
2021 [1]
2019 [3]
2018 [1]
2017 [7]
2016 [6]
2015 [2]
更多...
学科主题
Computer S... [1]
Computer S... [1]
Engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共83条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Enhanced Intrusion Detection System for an EH IoT Architecture Using a Cooperative UAV Relay and Friendly UAV Jammer
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 11, 页码: 1786-1799
作者:
Van Nhan Vo
;
Hung Tran
;
Chakchai So-In
收藏
  |  
浏览/下载:220/0
  |  
提交时间:2021/09/03
Detection probability (DP)
energy harvesting (EH)
friendly UAV jammer
Internet of Things (IoT)
system performance
UAV detection
An improved mutual authentication protocol based on perfect forward secrecy for satellite communications
期刊论文
International Journal of Satellite Communications and Networking, 2019
作者:
Xu, Shuishuai
;
Liu, Xindong
;
Ma, Mimi
;
Chen, Jianhua
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems
期刊论文
2019 IEEE International Conference on Communications Workshops, ICC Workshops 2019 - Proceedings, 2019
作者:
Jameel, Furqan
;
Khan, Wali Ullah
;
Chang, Zheng
;
Ristaniemi, Tapani
;
Liu, Ju
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/12/11
Decode-and-forward (DF)
Deep learning
Nonorthogonal multiple access (NOMA)
Power-splitting
Secrecy Analysis and Learning-based Optimization of Cooperative NOMA SWIPT Systems
会议论文
IEEE International Conference on Communications (ICC), MAY 20-24, 2019
作者:
Jameel, Furqan
;
Khan, Wali Ullah
;
Chang, Zheng
;
Ristaniemi, Tapani
;
Liu, Ju
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/31
Decode-and-forward (DF)
Deep learning
Non-orthogonal multiple access
(NOMA)
Power-splitting
Secrecy Capacity of Artificial Noise Aided Secure Communication in MIMO Rician Channels
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 7921-7929
作者:
Ahmed, Mansoor
;
Bai, Lin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
Artificial noise
decode and forward relay network
eigenvalue distribution
MIMO channel capacity
physical layer security
Rician channels
secrecy capacity
Wishart matrices
Destination Assisted Jamming and Beamforming for Improving the Security of AF Relay Systems
期刊论文
IEEE ACCESS, 2017, 卷号: 5, 页码: 4125-4131
作者:
Ouyang, Nian
;
Jiang, Xue-Qin
;
Bai, Enjian
;
Wang, Hui-Ming
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/26
amplify-and-forward (AF)
beamforming
secrecy rate
Jamming
artificial noise (AN)
Joint distributed beamforming and jamming schemes in decode-and-forward relay networks for physical layer secrecy
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2017
作者:
Gu, Chengmin
;
Zhang, Chao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Distributed beamforming
Jamming
Relay networks
Physical layer secrecy
Correlated channel model-based secure communications in dual-hop wireless communication networks
期刊论文
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017
Yuan, Zhen-hua
;
Chen, Chen
;
Cheng, Xiang
;
Lv, Guo-cheng
;
Yang, Liu-qing
;
Jin, Ye
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2017/12/03
Physical layer security
Relay beamforming
Correlated channels
Ergodic secrecy rate
PHYSICAL LAYER SECURITY
CONFIDENTIAL MESSAGES
BROADCAST CHANNELS
RELAY SELECTION
TAP CHANNEL
CAPACITY
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
He, Debiao
;
Wang, Ding
;
Xie, Qi
;
Chen, Kefei
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
PRESERVING AUTHENTICATION
SENSOR NETWORKS
SCHEME
SECURE
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
Science China. Information Science, 2017
He Debiao
;
Wang Ding
;
Xie Qi
;
Chen Kefei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
©版权所有 ©2017 CSpace - Powered by
CSpace