• Publications
  • Influence
On Physical Layer Security of Double Rayleigh Fading Channels for Vehicular Communications
TLDR
The obtained results reveal the importance of taking the eavesdropper location uncertainty into consideration while designing V2V communication systems. Expand
Performance Analysis of Physical Layer Security Over Generalized-$K$ Fading Channels Using a Mixture Gamma Distribution
TLDR
The closed-form expressions for the average secrecy capacity, secure outage probability, and the probability of strictly positive secrecy capacity are derived and provide a unified form, which can handle several of the well-known composite fading environments as special or limiting cases. Expand
On Physical Layer Security Over Generalized Gamma Fading Channels
TLDR
The closed-form expressions for the probability of strictly positive secrecy capacity and the lower bound of secure outage probability are derived from the classic Wyner's wiretap model over the generalized Gamma fading channels. Expand
On Physical-Layer Security Over SIMO Generalized-$K$ Fading Channels
TLDR
The analytical expressions for the probability of strictly positive secrecy capacity, secure outage probability (SOP), and average secrecy capacity (ASC) of SIMO systems are derived. Expand
Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels
TLDR
This paper investigates the secrecy outage performances of optimal antenna selection and suboptimal antenna selection schemes for MIMO underlay cognitive radio systems over Nakagami- <inline-formula> <tex-math notation="LaTeX">$m$</tex- math></inline- formula> channels, and compares them with the space-time transmission (STT) scheme. Expand
On Secure NOMA Systems With Transmit Antenna Selection Schemes
TLDR
This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems with different transmit antenna selection strategies and finds that the secrecy diversity order for all the TAS schemes with fixed power allocation is zero. Expand
Secure UAV-to-UAV Systems With Spatially Random UAVs
TLDR
This letter investigates the secrecy performance of an unmanned aerial vehicle (UAV)-to-UAV system, where a UAV acts as the source transmitting information to a legitimate UAV receiver while a group of UAVs trying to eavesdrop the information delivery. Expand
On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI
TLDR
The results reveal the impact of the imperfect CSI on the secrecy performance of MISO SWIPT systems in the presence of multiple wiretap channels. Expand
On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection
TLDR
The analysis illustrates that the OAS scheme outperforms SAS scheme, and the asymptotic result shows that no matter which scheme is considered, the Oas and SAS schemes can achieve the same secrecy diversity order. Expand
...
1
2
3
4
5
...