2020
DOI: 10.1109/lcomm.2019.2958809
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communications With a Full-Duplex Relay Network Under Residual Self-Interference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…PHY-security aspects have been thoroughly investigated in the literature for various network scenarios under different fading channels without considering the cognitive framework [11][12][13][14][15][16][17][18][19][20]. Furthermore, the authors in [21] have proposed a machine-learning-based method to locate the vehicles generating jamming signals by monitoring the physical channel parameters of the vehicles in the vehicular networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…PHY-security aspects have been thoroughly investigated in the literature for various network scenarios under different fading channels without considering the cognitive framework [11][12][13][14][15][16][17][18][19][20]. Furthermore, the authors in [21] have proposed a machine-learning-based method to locate the vehicles generating jamming signals by monitoring the physical channel parameters of the vehicles in the vehicular networks.…”
Section: Related Workmentioning
confidence: 99%
“…( 6.561.16)) of [48] and (eq. ( 6.561.8)) of [48], as presented in (14). Moreover, I 1b in (A3) can be evaluated by first applying the change of variables y η − (η−1)w ηρ = t and ηt λ m = r and the transformation K ν (…”
Section: Appendix Amentioning
confidence: 99%