Weifeng Mou

  • Citations Per Year
Learn More
This work investigates the secure transmission in the wireless information and power transfer system where a source node communicates with a wireless-powered full-duplex destination node in the presence of a passive eavesdropper. In particular, we propose such a two-phase time-sharing (TS) secure communication protocol: in the first phase, energy harvesting(More)
This paper investigates the performance of N-hop (N ≥ 2) amplify-and-forward (AF) relaying systems with both relays and the destination subject to independent and not necessarily identically distributed multiple cochannel interferences (CCIs). Based on a new class of upper bound of the equivalent signal-to-interference ratio (SIR) which is the harmonic mean(More)
In this paper, secure communication for RF-powered cognitive networks has been investigated in which the secondary source (SS) transmits confidential information to the destination (SD) using the harvested energy form primary transmitter (PT) in the presence of a passive eavesdropper (SE). Note that the transmission power at the SS is subject to two(More)
A compatible chord code for inputting elements of Chinese characters (ECC) to computer was proposed. It capitalized on the graphic compatibility between ECC and chord combination of keys (CCK) on a single-handed chord keyboard with five keys. Experimental results showed that the proposed compatible chord code was better than a code that randomly mapped ECC(More)
This paper investigates the secrecy performance of amplify-and-forward (AF)-relaying cooperative cognitive radio networks (CCRNs) over Rayleigh-fading channels. Specifically, we consider practical passive eavesdropping scenarios, where the channel state information of the eavesdropper’s link is not available at the secondary transmitter. In order to avoid(More)
  • 1