In this paper, we propose a novel fully Bayesian approach for the massiv...
In this paper, we design a novel two-phase unsourced random access (URA)...
For mission-critical massive machine-type communications (mMTC) applicat...
Reconfigurable Intelligent Surface (RIS) is one of the promising techniq...
In this paper, we investigate the design of a burst jamming detection me...
In fifth generation (5G) new radio (NR), the demodulation reference sign...
In this paper, we propose a robust secrecy transmission scheme for
intel...
This paper considers joint active user detection (AUD) and channel estim...
Reconfigurable Intelligent Surface (RIS) draws great attentions in acade...
Short-packet communication is a key technology to support two emerging
a...
Multi-access edge computing (MEC) has been regarded as a promising techn...
Exploiting short packets for communications is one of the key technologi...
In this paper, an intelligent reflecting surface (IRS) assisted spectrum...
We consider that a transmitter covertly communicates with multiple recei...
In this correspondence, we study the physical layer security in a stocha...
This paper considers an uplink massive machine-type communication (mMTC)...
Pilot contamination attack (PCA) in a time division duplex wireless
comm...
In this paper, we consider an intelligent reflecting surface (IRS) assis...
In this letter, we design passive beamforming in an intelligent reflecti...
In this letter, improving the security of an intelligent reflecting surf...
In this letter, we consider downlink transmission of a multiuser
multipl...
This paper proposes a secure downlink multi-user transmission scheme ena...
Secrecy transmission is investigated for a cooperative jamming scheme, w...
This paper studies physical-layer secure transmissions from a transmitte...
In this letter, we consider an intelligent reflecting surface (IRS) assi...
The deployment of unmanned aerial vehicle (UAV) for surveillance and
mon...
Due to their flexible deployment and on-demand mobility, small-scale unm...
In this paper, we establish a framework for low probability of detection...
A multiuser multiple-input multiple-output wireless communication system...
In pervasive Internet of Things (IoT) applications, the use of short pac...
This paper proposes a secure users oriented multiple-input and single-ou...
This paper studies multi-antenna-aided covert communications coexisting ...
Device-to-device (D2D) communication raises new transmission secrecy
pro...
This paper studies physical-layer security for a cache-enabled heterogen...
We propose a downlink beamforming scheme that combines spatial division ...
Wireless caching has been widely recognized as a promising technique for...
In this paper, we investigate the design of a pilot spoofing attack (PSA...
This paper explores the physical-layer security in a small cell network ...
Fake base station (FBS) attack is a great security challenge to wireless...
Millimeter wave (mmWave) signals are much more sensitive to blockage, wh...
This letter studies the practical design of secure transmissions without...
In this paper, we consider the problem of joint secure routing and trans...
Unmanned aerial vehicle (UAV) system is vulnerable to the control signal...
Millimeter wave offers a sensible solution to the capacity crunch faced ...
In the fifth generation era, the pervasive applications of Internet of T...
Transmitter-side channel state information (CSI) of the legitimate
desti...
Social awareness and social ties are becoming increasingly fashionable w...
This work proposes a novel location-based multi-group multicast framewor...