This paper aims to analyze the stochastic performance of a multiple inpu...
Random binning is a powerful and widely used tool in information theory....
The performance of physical layer secrecy approach in non-orthogonal mul...
Abnormality, defined as any abnormal feature in the system, may occur in...
In attribute-based access control, users with certain verified attribute...
The problem of distributed binary hypothesis testing in the Gray-Wyner
n...
In this paper, we study the degrees of freedom (DoF) of the
frequency-se...
Non-orthogonal multiple access (NOMA) and massive multiple-input
multipl...
In this paper, we study the problem of distributed multi-user secret sha...
Interference alignment (IA) is a promising scheme to increase the throug...
We study the problem of joint information and energy transfer in a binar...
The concentration of molecules in the medium can provide us very useful
...
Most diffusion based molecular channels suffer from low information capa...
The emerging applications of machine learning algorithms on mobile devic...
The nature of molecular transmitter imposes some limitations on the mole...
Sharing resource blocks in NOMA systems provides more opportunity to the...
In this paper, we argue that in many basic algorithms for machine learni...
Enabling cooperation in a NOMA system is a promising approach to improve...
The main security service in the connected world of cyber physical syste...
This paper studies the impact of a transmitter's molecule generation pro...
The widespread use of cloud computing services raises the question of ho...