Legitimate Eavesdropping with Wireless Powered Proactive Full-duplex Eavesdroppers
暂无分享,去创建一个
[1] Hongbo Zhu,et al. Jammer-Assisted Legitimate Eavesdropping in Wireless Powered Suspicious Communication Networks , 2019, IEEE Access.
[2] Qi Zhang,et al. Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.
[3] Ding Xu,et al. Legitimate Surveillance With Battery-Aided Wireless Powered Full-Duplex Monitor , 2020, IEEE Systems Journal.
[4] Wei Zhao,et al. Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System , 2018, IEEE Access.
[5] Ding Xu,et al. Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users , 2020, IEEE Communications Letters.
[6] Jie Xu,et al. Proactive Eavesdropping via Jamming over HARQ-Based Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[7] Jie Xu,et al. Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.
[8] Victor C. M. Leung,et al. Incomplete CSI Based Resource Optimization in SWIPT Enabled Heterogeneous Networks: A Non-Cooperative Game Theoretic Approach , 2018, IEEE Transactions on Wireless Communications.
[9] Ding Xu,et al. Legitimate Surveillance of Suspicious Multichannel DF Relay Networks With Monitor Mode Selection , 2021, IEEE Wireless Communications Letters.
[10] Ding Xu,et al. Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks , 2020, IEEE Transactions on Vehicular Technology.
[11] Hongbo Zhu,et al. Jamming-Assisted Legitimate Eavesdropping and Secure Communication in Multicarrier Interference Networks , 2020, IEEE Systems Journal.
[12] Rui Zhang,et al. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.
[13] Bruno Clerckx,et al. Communications and Signals Design for Wireless Power Transmission , 2016, IEEE Transactions on Communications.
[14] Caijun Zhong,et al. Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.
[15] Victor C. M. Leung,et al. Collusive Eavesdropping in Interference Alignment Based Wireless Networks , 2017, IEEE Transactions on Wireless Communications.
[16] Hongbo Zhu,et al. Secure Transmission for SWIPT IoT Systems With Full-Duplex IoT Devices , 2019, IEEE Internet of Things Journal.
[17] Jie Xu,et al. Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.