相关期刊:《Communications in Theoretical Physics》《Wuhan University Journal of Natural Sciences》《Chinese Physics B》《Bulletin of the Chinese Academy of Sciences》更多>>
supported by the National Key Research and Development Program of China(2021YFB3100400);the National Natural Science Foundation of China(62202276,62232010);Shandong Science Fund for Excellent Young Scholars(2022HWYQ-038);Shandong Science Fund(2023TSGC0105).
In today’s information age,eavesdropping has been one of the most serious privacy threats in information security,such as exodus spyware(Rudie et al.,2021)and pegasus spyware(Anatolyevich,2020).And the main one of th...
The Natural Science Foundation of Henan Province(No.232300421097);the Program for Science&Technology Innovation Talents in Universities of Henan Province(No.23HASTIT019,24HASTIT038);the China Postdoctoral Science Foundation(No.2023T160596,2023M733251);the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University(No.2023D11);the Song Shan Laboratory Foundation(No.YYJC022022003)。
In this article,the secure computation efficiency(SCE)problem is studied in a massive multipleinput multiple-output(mMIMO)-assisted mobile edge computing(MEC)network.We first derive the secure transmission rate based ...
supported in part by National Natural Science Foundation of China(Grant Nos.62271268,62071253,62371252);National Science Fund for Distinguished Young Scholars of China(Grant No.62125203);Jiangsu Provincial Key Research and Development Program(Grant No.BE2022800);Jiangsu Provincial 333 Talent Project;the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network Technology(Nanjing University of Posts and Telecommunications)(Grant No.JZNY202303)。
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS)empowered integrated sensing and multiuser communications(ISAMC)network,where a dual-fu...
supported by the National Natural Science Foundation of China(Nos.62071485,61671472,and 62271503);the Natural Science Foundation of Jiangsu Province,China(Nos.20201334 and 20181335)。
We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of li...
This work was supported by the Key Scientific and Technological Project of Henan Province(Grant Number 222102210212);Doctoral Research Start Project of Henan Institute of Technology(Grant Number KQ2005);Key Research Projects of Colleges and Universities in Henan Province(Grant Number 23B510006).
In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of ...
supported by the NationalNatural Science Foundation of China under Grants U1836104,61801073,61931004,62072250;National Key Research and Development Program of China under Grant 2021QY0700;The Startup Foundation for Introducing Talent of NUIST under Grant 2021r039.
Non-orthogonal multiple access technology(NOMA),as a potentially promising technology in the 5G/B5G era,suffers fromubiquitous security threats due to the broadcast nature of the wirelessmedium.In this paper,we focus ...
America's military and political elite are again trying to explain away a leaked documents scandal.For now,a 21-year-old Air National Guardsman is believed responsible for the latest leak and was arrested by the Feder...
This work was supported in part by the National Natural Science Foundation of China(62273087,61933007,62273088,U21A2019,62073180);the Shanghai Pujiang Program of China(22PJ1400400);the Program of Shanghai Academic/Technology Research Leader of China(20XD1420100);the European Union’s Horizon 2020 Research and Innovation Programme(820776)(INTEGRADDE);the Royal Society of UK;the Alexander von Humboldt Foundation of Germany.
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measu...
supported in part by National Key R&D Program of China(Grant No.2019YFE0114000);in part by National Natural Science Foundation of China(Grant Nos.61932005,62071066);in part by Shenzhen Science and Technology Innovation Commission Free Exploring Basic Research Project(Grant Nos.2021Szvup008,JCYJ20170307172830043);in part by National High-tech R&D Program of China(Grant No.2014AA01A701);in part by 111 Project of China(Grant No.B16006);in part by Fundamental Research Funds for the Central Universities(Grant No.2020RC39)。
The analysis of secret key capacity is an important investigation on the design of secret key agreement protocol.In this paper,we characterize the secret key capacity based on received signal envelopes obeying Nakagam...
supported in part by the National Natural Science Foundation of China under Grant 62071485, Grant 61901519, Grant 62001513;in part by the Basic Research Project of Jiangsu Province under Grant BK 20192002;the Natural Science Foundation of Jiangsu Province under Grant BK20201334, and BK20200579
Aiming at the physical layer security(PLS)secure transmission existing in the information backhaul link of the satellite-UAV integrated(SUI)network,a two-layer Stackelberg game model(TSGM)that can resist full-duplex(F...