193 related articles for article (PubMed ID: 35890937)
1. Secrecy Coding Analysis of Short-Packet Full-Duplex Transmissions with Joint Iterative Channel Estimation and Decoding Processes.
Vuong BQ; Gautier R; Fiche A; Marazin M; Despina-Stoian C
Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890937
[TBL] [Abstract][Full Text] [Related]
2. Joint Semi-Blind Self-Interference Cancellation and Equalisation Processes in 5G QC-LDPC-Encoded Short-Packet Full-Duplex Transmissions.
Vuong BQ; Gautier R; Ta HQ; Nguyen LL; Fiche A; Marazin M
Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336375
[TBL] [Abstract][Full Text] [Related]
3. SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security.
Silva A; Gomes M; Vilela JP; Harrison WK
Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33525355
[TBL] [Abstract][Full Text] [Related]
4. Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays.
Kong Z; Wang D; Li Y; Wang C
Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30428618
[TBL] [Abstract][Full Text] [Related]
5. Design and Analysis of Non-Binary LDPC-CPM System for Hybrid Check Matrix Construction Algorithm of WSN.
Meng J; Zhao D; Zhang L
Sensors (Basel); 2018 Jul; 18(8):. PubMed ID: 30044447
[TBL] [Abstract][Full Text] [Related]
6. Secrecy Capacity Region of the AWGN MAC with External Eavesdropper and Feedback.
Yuan H; Xie G; Dai B
Entropy (Basel); 2023 Sep; 25(9):. PubMed ID: 37761639
[TBL] [Abstract][Full Text] [Related]
7. Secrecy Enhancing Scheme for Spatial Modulation Using Antenna Selection and Artificial Noise.
Shang P; Yu W; Zhang K; Jiang XQ; Kim S
Entropy (Basel); 2019 Jun; 21(7):. PubMed ID: 33267340
[TBL] [Abstract][Full Text] [Related]
8. Gaussian Multiuser Wiretap Channels in the Presence of a Jammer-Aided Eavesdropper.
Chou RA; Yener A
Entropy (Basel); 2022 Nov; 24(11):. PubMed ID: 36359685
[TBL] [Abstract][Full Text] [Related]
9. Polar Coding for Confidential Broadcasting.
Del Olmo Alòs J; Fonollosa JR
Entropy (Basel); 2020 Jan; 22(2):. PubMed ID: 33285924
[TBL] [Abstract][Full Text] [Related]
10. Energy consumption modeling and analysis for short-reach optical transmissions using irregular LDPC codes.
Zheng Z; Yang C; Yang C; Wang Z
Opt Express; 2022 Nov; 30(24):43852-43871. PubMed ID: 36523075
[TBL] [Abstract][Full Text] [Related]
11. Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer.
Hayajneh M; Gulliver TA
Entropy (Basel); 2023 Jan; 25(1):. PubMed ID: 36673263
[TBL] [Abstract][Full Text] [Related]
12. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.
Li Z; Jing T; Ma L; Huo Y; Qian J
Sensors (Basel); 2016 Mar; 16(3):. PubMed ID: 26959032
[TBL] [Abstract][Full Text] [Related]
13. Realizing Efficient Security and Privacy in IoT Networks.
Anajemba JH; Tang Y; Iwendi C; Ohwoekevwo A; Srivastava G; Jo O
Sensors (Basel); 2020 May; 20(9):. PubMed ID: 32375240
[TBL] [Abstract][Full Text] [Related]
14. Experimental Phantom-Based Security Analysis for Next-Generation Leadless Cardiac Pacemakers.
Awan MF; Perez-Simbor S; Garcia-Pardo C; Kansanen K; Cardona N
Sensors (Basel); 2018 Dec; 18(12):. PubMed ID: 30544594
[TBL] [Abstract][Full Text] [Related]
15. Secrecy Capacity of a Class of Erasure Wiretap Channels in WBAN.
Wang B; Deng J; Sun Y; Guo W; Feng G
Sensors (Basel); 2018 Nov; 18(12):. PubMed ID: 30486250
[TBL] [Abstract][Full Text] [Related]
16. Performance Analysis of Turbo Codes, LDPC Codes, and Polar Codes over an AWGN Channel in the Presence of Inter Symbol Interference.
Cuc AM; Morgoș FL; Grava C
Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850540
[TBL] [Abstract][Full Text] [Related]
17. Physical Layer Security Using Two-Path Successive Relaying.
Liau QY; Leow CY; Ding Z
Sensors (Basel); 2016 Jun; 16(6):. PubMed ID: 27294924
[TBL] [Abstract][Full Text] [Related]
18. An optimized initialization for LDPC decoding over GF(q) in impulsive noise environments.
Liu H; Zhao H; Chen X; Feng W
PLoS One; 2021; 16(5):e0250930. PubMed ID: 33956886
[TBL] [Abstract][Full Text] [Related]
19. Controversial Variable Node Selection-Based Adaptive Belief Propagation Decoding Algorithm Using Bit Flipping Check for JSCC Systems.
Wang H; Zhang W; Jing Y; Chang Y; Liu Y
Entropy (Basel); 2022 Mar; 24(3):. PubMed ID: 35327937
[TBL] [Abstract][Full Text] [Related]
20. Shifted LT Code Security Scheme for Partial Information Encryption.
Zhang S; Niu F; Wang L; Yu L
Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554181
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]