Safeguarding Next Generation Multiple Access Using Physical Layer Security Techniques: A Tutorial (2403.16477v3)
Abstract: Driven by the ever-increasing requirements of ultra-high spectral efficiency, ultra-low latency, and massive connectivity, the forefront of wireless research calls for the design of advanced next generation multiple access schemes to facilitate provisioning of these stringent demands. This inspires the embrace of non-orthogonal multiple access (NOMA) in future wireless communication networks. Nevertheless, the support of massive access via NOMA leads to additional security threats, due to the open nature of the air interface, the broadcast characteristic of radio propagation as well as intertwined relationship among paired NOMA users. To address this specific challenge, the superimposed transmission of NOMA can be explored as new opportunities for security aware design, for example, multiuser interference inherent in NOMA can be constructively engineered to benefit communication secrecy and privacy. The purpose of this tutorial is to provide a comprehensive overview on the state-of-the-art physical layer security techniques that guarantee wireless security and privacy for NOMA networks, along with the opportunities, technical challenges, and future research trends.
- L. Lv, J. Chen, Q. Ni, Z. Ding, and H. Jiang, “Cognitive non-orthogonal multiple access with cooperative relaying: A new wireless frontier for 5G spectrum sharing,” IEEE Commun. Mag., vol. 56, no. 4, pp. 188–195, Apr. 2018.
- Z. Ding, X. Lei, G. K. Karagiannidis, R. Schober, J. Yuan, and V. K. Bhargava, “A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2181–2195, Oct. 2017.
- B. Makki, K. Chitti, A. Behravan, and M.-S. Alouini, “A survey of NOMA: Current status and open research challenges,” IEEE Open J. Commun. Soc., vol. 1, pp. 179–189, 2020.
- L. Lv, H. Jiang, Z. Ding, Q. Ye, N. Al-Dhahir, and J. Chen, “Secure non-orthogonal multiple access: An interference engineering perspective,” IEEE Network, vol. 35, no. 4, pp. 278–285, Jul./Aug. 2021.
- Y. Feng, S. Yan, N. Yang, Z. Yang, and J. Yuan, “Safeguarding non-orthogonal multiple access with physical layer techniques,” IEEE Network, vol. 36, no. 3, pp. 145–151, May/Jun. 2022.
- M. Vaezi, R. Schober, Z. Ding, and H. V. Poor, “Non-orthogonal multiple access: Common myths and critical questions,” IEEE Wireless Commun., vol. 25, no. 6, pp. 174–180, Oct. 2019.
- Z. Ding, L. Lv, F. Fang, O. A. Dobre, G. K. Karagiannidis, N. Al-Dhahir, R. Schober, and H. V. Poor, “A state-of-the-art survey on reconfigurable intelligent surface-assisted non-orthogonal multiple access networks,” Proc. IEEE, vol. 110, no. 9, pp. 1358–1379, Sep. 2022.
- B. He, A. Liu, N. Yang, and V. K. N. Lau, “On the design of secure non-orthogonal multiple access systems,” IEEE J. Sel. Areas Commun., vol. 35, no. 10, pp. 2196–2206, Oct. 2017.
- H. Han, Y. Cao, M. Sheng, N. Zhao, J. Liu, and D. Niyato, “IRS-aided secure NOMA networks against internal and external eavesdropping,” IEEE Trans. Commun., vol. 70, no. 11, 7536–7548, Nov. 2022.
- Z. Ding, Z. Zhao, M. Peng and H. V. Poor, “On the spectral efficiency and security enhancements of NOMA assisted multicast-unicast streaming,” IEEE Trans. Commun., vol. 65, no. 7, 3151–3163, Jul. 2017.
- S. Thapar, D. Mishra, and R. Saini, “Novel outage-aware NOMA protocol for secrecy fairness maximization among untrusted users,” IEEE Trans. Veh. Technol., vol. 26, no. 11, pp. 13259–13275, Nov. 2020.
- L. Lv, Z. Ding, J. Chen, and N. Al-Dhahir, “Design of secure NOMA against full-duplex proactive eavesdropping,” IEEE Wireless Commun. Lett., vol. 8, no. 4, pp. 1090–1094, Aug. 2019.
- Y. Liu, H.-H. Chen, and L. Wang, “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 347–376, 1st Quart., 2017.
- Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances, and future trends,” IEEE Proc. IEEE, vol. 104, no. 9, pp. 1727–1765, Sep. 2016.
- X. Chen, D. W. K. Ng, W. H. Gerstacker, and H.-H. Chen, “A survey on multiple-antenna techniques for physical layer security,” IEEE Commun. Surveys Tuts., vol. 19, no. 2, pp. 1027–1053, 2nd Quart., 2017.
- H.-M. Wang, C. Wang, and D. W. K. Ng, “Artificial noise assisted secure transmission under training and feedback,” IEEE Trans. Signal Process., vol. 63, no. 23, pp. 6285–6298, Dec. 2015.
- Q. Li and W.-K Ma, “Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization,” IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
- N. Yang, L. Wang, G. Geraci, “Safeguarding 5G wireless communication networks using physical layer security,” IEEE Commun. Mag., vol. 53, no. 4, pp. 20–27, Apr. 2015.
- D. Xu, K. Yu, and J. A. Ritcey, “Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0,” IEEE Trans Ind. Informat., vol. 18, no. 9, pp. 6368–6378, Sep. 2022.
- D. Xu and P. Ren, “Quantum learning based nonrandom superimposed coding for secure wireless access in 5G URLLC,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 2429–2444, 2021.
- S. Yan, X. Zhou, J. Hu, and S. V. Hanly, “Low probability of detection communication: Opportunities and challenges,” IEEE Wireless Commun., vol. 26, no. 5, pp. 19–25, Oct. 2019.
- B. A. Bash, D. Goeckel, D. Towsley, and S. Guha, “Hiding information in noise: Fundamental limits of covert wireless communication,” IEEE Commun. Mag., vol. 53, no. 12, pp. 26–31, Dec. 2015.
- T.-X. Zheng, H.-M. Wang, D. W. K. Ng, and J. Yuan, “Multi-antenna covert communications in random wireless networks,” IEEE Trans. Wireless Commun., vol. 18, no. 3, pp. 1974–1987, Mar. 2019.
- L. Ruan, A. Conti, and W. Z. Win, “Unified interference engineering for wireless information secrecy,” IEEE J. Sel. Areas Commun., vol. 36, no. 7, pp. 1579–1592, Jul. 2018.
- C. Masouros and G. Zheng, “Exploiting known interference as green signal power for downlink beamforming optimization,” IEEE Trans. Signal Process., vol. 63, no. 14, pp. 3628–3640, Jul. 2015.
- M. R. A. Khandaker, C. Masouros, and K.-K. Wong, “Constructive interference based secure precoding: A new dimension in physical layer security,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 9, pp. 2256–2268, Sep. 2018.
- Y. Fan, A. Li, X. Liao, and V. C. M. Leung, “Secure interference exploitation precoding in MISO wiretap channel: Destructive region redefinition with efficient solutions,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 402–417, 2021.
- A. Kalantari, M. Soltanalian, S. Maleki, S. Chatzinotas, and B. Ottersten, “Directional modulation via symbol-level precoding: A way to enhance security,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 8, pp. 1478–1493, Dec. 2016.
- Y. Fan, R. Yao, A. Li, X. Liao, and V. C. M. Leung, “Robust deception scheme for secure interference exploitation under PSK modulations,” IEEE Trans. Commun., vol. 69, no. 8, pp. 5425–5440, Aug. 2021.
- Q. Xu, P. Ren, and A. L. Swindlehurst, “Rethinking secure precoding via interference exploitation: A smart eavesdropper perspective,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 585–600, 2021.
- R. Liu, M. Li, Q. Liu, and A. L. Swindlehurst, “Secure symbol-level precoding in MU-MISO wiretap systems,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3359–3373, 2020.
- V. Y. F. Tan and S.-H. Lee, “Time-division is optimal for covert communication over some broadcast channels,” IEEE Trans. Inf. Forensics Security, vol. 14, vol. 5, pp. 1377–1389, May 2019.
- K. S. K. Arumugam and M. R. Bloch, “Embedding covert information in broadcast communications,” IEEE Trans. Inf. Forensics Security, vol. 14, vol. 10, pp. 2787–2801, Oct. 2019.
- L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Covert communication in intelligent reflecting surface-assisted NOMA systems: Design, analysis, and optimization,” IEEE Trans. Wireless Commun., vol. 21, no. 3, pp. 1735–1750, Mar. 2022.
- Z. Hadzi-Velkov, S. Pejoski, and N. Zlatanov, “Achieving near ideal covertness in NOMA systems with channel inversion power control,” IEEE Commun. Lett., vol. 26, no. 11, pp. 2542–2546, Nov. 2022.
- X. Chen, Z. Zhang, C. Zhong, D. W. K. Ng, and R. Jia, “Exploiting inter-user interference for secure massive non-orthogonal multiple access,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 788–801, Apr. 2018.
- Y. Feng, S. Yan, Z. Yang, N. Yang, and J. Yuan, “Beamforming design and power allocation for secure transmission with NOMA,” IEEE Trans. Wireless Commun., vol. 18, no. 5, pp. 2639–2651, May 2019.
- L. Lv, Z. Li, H. Ding, and J. Chen, “Secure NOMA and OMA coordinated transmission schemes in untrusted relay networks,” Sci. China Inf. Sci., vol. 64, no. 10, 2021.
- L. Lv, Z. Li, H. Ding, Y. Zhou, and J. Chen, “Secure coordinated direct and untrusted relay transmissions via interference engineering,” Sci. China Inf. Sci., vol. 65, no. 8, 2022.
- R. Hoshyar, F. P. Wathan, and R. Tafazolli, “Novel low-density signature for synchronous CDMA systems over AWGN channel,” IEEE Trans. Signal Process., vol. 56, no. 4, pp. 1616–1626, Apr. 2008.
- R. Hoshyar, R. Razavi, and M. Al-Imari, “LDS-OFDM an efficient multiple access technique,” in Proc. IEEE Veh. Technol. Conf. (VTC), May 2010, pp. 1–5.
- H. Nikopour and H. Baligh, “Sparse code multiple access,” in Proc. IEEE Int. Symp. Pers., Indoor, Mobile Radio Commun. (PIMRC), Sep. 2013, pp. 332–336.
- X. Dai, Z. Zhang, S. Chen, S. Sun, and B. Bai, “Pattern division multiple access (PDMA): A new multiple access technology for 5G,” IEEE Wireless Commun., vol. 25, no. 2, pp. 54–60, Apr. 2018.
- Z. Ding, R. Schober, and H. V. Poor, “Unveiling the importance of SIC in NOMA systems-part I: State of the art and recent findings,” IEEE Commun. Lett., vol. 24, no. 11, pp. 2373–2377, Nov. 2020.
- Z. Ding, R. Schober, and H. V. Poor, “Unveiling the importance of SIC in NOMA systems-part II: New results and future directions,” IEEE Commun. Lett., vol. 24, no. 11, pp. 2378–2382, Nov. 2020.
- Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users,” IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501–1505, Dec. 2014.
- S. Timotheou and I. Krikidis, “Fairness for non-orthogonal multiple access in 5G systems,” IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1647–1651, Oct. 2015.
- Z. Yang, Z. Ding, P. Fan, and G. K. Karagiannidis, “On the performance of non-orthogonal multiple access systems with partial channel information,” IEEE Trans. Commun., vol. 64, no. 2, pp. 654–667, Feb. 2016.
- Z. Zhang, H. Sun, and R. Q. Hu, “Downlink and uplink non-orthogonal multiple access in dense wireless network,” IEEE J. Sel. Areas Commun., vol. 35, no. 12, pp. 2771–2784, Dec. 2017.
- J. Kim and I. Lee, “Capacity analysis of cooperative relaying systems using non-orthogonal multiple access,” IEEE Commun. Lett., vol. 19, no. 11, pp. 1949–1952, Nov. 2015.
- M. Gong and Z. Yang, “The application of antenna diversity to NOMA with statistical channel state information,” IEEE Trans. Veh. Technol., vol. 68, no. 4, pp. 3755–3765, Apr. 2019.
- L. Lv, L. Yang, H. Jiang, T. H. Luan, and J. Chen, “When NOMA meets multiuser cognitive radio: Opportunistic cooperation and user scheduling,” IEEE Trans. Veh. Technol., vol. 67, no. 7, pp. 6679–6684, Jul. 2018.
- Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, “Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer,” IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 938–953, Apr. 2016.
- H. Wang, Z. Shi, Y. Fu, and R. Song, “Outage performance for NOMA-aided small cell networks with HARQ,” IEEE Wireless Commun. Lett., vol. 10, no. 1, pp. 72–76, Jan. 2021.
- Y. Xu, J. Cheng, G. Wang, and V. C. M. Leung, “Adaptive coordinated direct and relay transmission for NOMA networks: A joint downlink-uplink scheme,” IEEE Trans. Wireless Commun., vol. 20, no. 7, pp. 4328–4346, Jul. 2021.
- K. S. Ali, M. Haenggi, H. ElSawy, A. Chaaban, and M.-S. Alouini, “Downlink non-orthogonal multiple access (NOMA) in Poisson networks,” IEEE Trans. Commun., vol. 67, no. 2, pp. 1613–1628, Feb. 2019.
- Y. Ye, R. Q. Hu, G. Lu, and L. Shi, “Enhancing latency-constrained computation in MEC networks using uplink NOMA,” IEEE Trans. Commun., vol. 68, no. 4, pp. 2409–2425, Apr. 2020.
- Z. Ding, R. Schober, and H. V. Poor, “A new QoS-guarantee strategy for NOMA assisted semi-grant-free transmission,” IEEE Trans. Commun., vol. 69, no. 11, pp. 7489–7503, Nov. 2021.
- M. Yang, J. Chen, Z. Ding, Y. Liu, L. Lv, and L. Yang, “Joint power allocation and decoding order selection for NOMA systems: Outage-optimal strategies,” IEEE Trans. Wireless Commun., vol. 23, no. 1, pp. 290–304, Jan. 2024.
- M. Yang, J. Chen, Z. Ding, L. Lv, N. Al-Dhahir, and L. Yang, “Rate-aware user pair scheduling with joint power allocation and decoding order selection in NOMA systems,” IEEE Trans. Commun., vol. 71, no. 9, pp. 5303–5319, Sep. 2023.
- E. Khorov, A. Kureev, and I. Levitsky, “NOMA testbed on Wi-Fi,” in Proc. Indoor and Mobile Radio Communications (PIMRC), Sep. 2018, pp. 1153–1154.
- E. Khorov, A. Kureev, I. Levitsky, and I. F. Akyildiz, “Prototyping and experimental study of non-orthogonal multiple access in Wi-Fi networks,” IEEE Network, vol. 34, no. 4, pp. 210–217, Jul./Aug. 2020.
- E. Khorov, A. Kureev, I. Levitsky, and I. F. Akyildiz, “Prototyping NOMA constellation rotation in Wi-Fi,” in IEEE Conf. Computer Commun. Workshops (INFOCOM WKSHPS), Jul. 2020, pp. 1332–1333.
- A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355–1367, Oct. 1975.
- S. K. Leung-Yan-Cheong and M. E. Hellman, “The Gaussian wiretap channel,” IEEE Trans. Inf. Theory, vol. 24, no. 7, pp. 451–456, Jul. 1978.
- P. K. Gopala, L. Lai, and H. E. Gamal, “On the secrecy capacity of fading channels,” IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687–4698, Oct. 2008.
- P. L. Yu, J. Baras, and B. Sadler, “Physical-layer authentication,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 38–51, Mar. 2008.
- T. Daniels, M. Mina, and S. F. Russell, “Short paper: A signal fingerprinting paradigm for general physical layer and sensor network security and assurance,” in Proc. IEEE 1st Int. Conf. on Security and Privacy for Emerging Areas in Commun. Networks, pp. 219–221, 2005.
- D. B. Faria and D. R. Cheriton, “Detecting identity-based attacks in wireless networks using signalprints,” in Proc. ACM Workshop on Wireless Security, pp. 43–52, 2006.
- M. Ajtai, “Generating Hard Instances of Lattice Problems (Extended Abstract),” in Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 99–108, 1996.
- O. Regev, “On lattices, learning with errors, random linear codes, and cryptography,” Journal of the ACM (JACM), vol. 56, no. 6, pp. 1–40, 2009.
- McEliece, and J. Robert, “A public-key cryptosystem based on algebraic,” Coding Thv, vol. 4244, pp. 114–116, 1978.
- D. Jintai, and Dieter Schmidt, “Rainbow, a new multivariable polynomial signature scheme,” in International conference on applied cryptography and network security, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 164–175, 2005.
- T. Chengdong, Albrecht Petzoldt, and D. Jintai, “Efficient key recovery for all HFE signature variants,” in Advances in Cryptology-CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part I 41, Springer International Publishing, pp. 70–93, 2021.
- T. Chengdong, Albrecht Petzoldt, and D. Jintai, “Improved key recovery of the hfev-signature scheme,” Cryptology ePrint Archive, 2020.
- W. Beullens, “Breaking rainbow takes a weekend on a laptop,” in Annual International Cryptology Conference, Cham: Springer Nature Switzerland, pp. 464–479, 2022.
- A. E. S. Primitives, “Advanced Encryption Standard (AES)(FIPS-197),” 2003.
- N. I. S. T. Sha, and NIST DRAFT, “Standard: Permutation-based hash and extendable-output functions,” FIPS PUB vol. 202, no. 3, 2015.
- L. Lamport, “Constructing digital signatures from a one way function,” 1979.
- Buchmann, Johannes, Erik Dahmen, and Andreas Hulsing, “XMSS-a practical forward secure signature scheme based on minimal security assumptions,” in Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings 4, Springer Berlin Heidelberg, pp. 117-129, 2011.
- Jao, David, and Luca De Feo, “Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies,” in Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings 4, Springer Berlin Heidelberg, pp. 19–34, 2011.
- Castryck, Wouter, and Thomas Decru, “An efficient key recovery attack on SIDH,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cham: Springer Nature Switzerland, pp. 423-447, 2023.
- Bernstein, J. Daniel, and Tanja Lange, “Post-quantum cryptography,” Nature, vol. 549, no. 7671, pp. 188–194, 2017.
- M. Ranjbar Zefreh and J. A. Salehi, “Theoretical Studies of Ultrashort Light Pulse Spectrally-Phase-Encoded OCDMA System Using Power-Cubic Optical Nonlinear Preprocessor,” Journal of Lightwave Technology, vol. 33, no. 24, pp. 5062-5072, 15 Dec.15, 2015.
- Z. Gao, X. Wang, N. Kataoka and N. Wada, “Stealth Transmission of Time-Domain Spectral Phase Encoded OCDMA Signal Over WDM Network,” IEEE Photonics Technol. Lett, vol. 22, no. 13, pp. 993-995, July1, 2010.
- J. Ji, G. Zhang, W. Li, L. Sun, K. Wang and M. Xu, “Performance analysis of physical-layer security in an OCDMA-based wiretap channel,” J. Opt. Commun. Networking, vol. 9, no. 10, pp. 813-818, Oct. 2017.
- E. Khorov, A. Kureev, I. Levitsky, and I. F. Akyildiz, “A phase noise resistant constellation rotation method and its experimental validation for NOMA Wi-Fi,” IEEE J. Sel. Areas Commun., vol. 40, no. 4, pp. 1346–1354, Apr. 2022.
- B. A. Bash, D. Goeckel, and D. Towsley, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1921–1930, Sep. 2013.
- M. R. Bloch, “Covert communication over noisy channels: A resolvability perspective,” IEEE Trans. Inf. Theory, vol. 62, no. 5, pp. 2334–2354, May 2016.
- L. Wang, G. W. Wornell, and L. Zheng, “Fundamental limits of communication with low probability of detection,” IEEE Trans. Inf. Theory, vol. 62, no. 6, pp. 3493–3503, Jun. 2016.
- P. Mukherjee and S. Ulukus, “Covert bits through queues,” in Proc. IEEE Conf. Commun. Network Security, Oct. 2016, pp. 626–630.
- J. Kong, F. T. Dagefus, J. Choi, and P. Spasojevic, “Intelligent reflecting surface assisted covert communication with transmission probability optimization,” IEEE Wireless Commun. Lett., vol. 10, no. 8, pp. 1825–1829, Aug. 2021.
- D. Goeckel, B. Bash, S. Guha, and D. Towsley, “Covert communications when the warden does not know the background noise power,” IEEE Commun. Lett., vol. 20, no. 2, pp. 236–239, Feb. 2016.
- B. He, S. Yan, X. Zhou, and V. K. N. Lau, “On covert communication with noise uncertainty,” IEEE Commun. Lett., vol. 21, no. 4, pp. 941–944, Apr. 2017.
- K.-H. Cho and S.-H. Lee, “Treating interference as noise is optimal for covert communication over interference channels,” IEEE Trans. Inf. Forens. Security, vol. 16, pp. 322–332, 2021.
- B. He, S. Yan, X. Zhou, and H. Jafarkhani, “Covert wireless communication with a poisson field of interferers,” IEEE Trans. Wireless Commun., vol. 17, no. 9, pp. 6005–6017, Sep. 2018.
- B. A. Bash, D. Goeckel, and D. Towsley, “Covert communication gains from adversarys ignorance of transmission time,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 8394–8405, Dec. 2016.
- D. I. Kim and V. K. Bhargava, “Performance of multidimensional multicode DS-CDMA using code diversity and error detection,” IEEE Trans. Commun., vol. 49, no. 5, pp. 875–887, May 2001.
- D. I. Kim, E. Hossain, and V. K. Bhargava, “Dynamic rate adaptation based on multidimensional multicode DS-CDMA in cellular wireless networks,” IEEE Trans. Commun., vol. 51, no. 2, pp. 247–260, Feb 2003.
- Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin, “Secure beamforming in downlink MISO non-orthogonal multiple access systems,” IEEE Trans. Veh. Technol., vol. 66, no. 8, pp. 7563–7567, Aug. 2017.
- Z. Rezki and M.-S. Alouini, “On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint,” in Proc. IEEE Int. Conf. Commun. Workshops (ICC Workshops), Jun. 2011, pp. 1–5.
- J. Zhu, R. Schober, and V. K. Bhargava, “Linear precoding of data and artificial noise in secure massive MIMO systems,” IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2245–2261, Mar. 2016.
- N. Nandan, S. Majhi, and H.-C. Wu, “Secure beamforming for MIMO-NOMA-based cognitive radio network,” IEEE Commun. Lett., vol. 22, no. 8, pp. 1708–1711, Aug. 2018.
- Y. Qi and M. Vaezi, “Signaling design for MIMO-NOMA with different security requirements,” IEEE Trans. Signal Process., vol. 70, pp. 1389–1401, 2022.
- J. Pauls and M. Vaezi, “Secure pecoding in MIMO-NOMA: A deep learning approach,” IEEE Wireless Commun. Lett., vol. 11, no. 1, pp. 77–80, Jan. 2022.
- S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
- F. Zhou, Z. Chu, H. Sun, R. Q. Hu, and L. Hanzo, “Artificial noise aided secure cognitive beamforming for cooperative MISO-NOMA using SWIPT,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 918–931, Jan. 2018.
- F. Jia, C. Zhang, C. Jiang, M. Li, and J. Ge, “Guaranteeing positive secrecy rate for NOMA system against internal eavesdropping,” IEEE Commun. Lett., vol. 25, no. 6, pp. 1805–1809, Jun. 2021.
- Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo, “Enhancing the physical layer security of non-orthogonal multiple access in largescale networks,” IEEE Trans. Wireless Commun., vol. 16, no. 3, pp. 1656–1672, Mar. 2017.
- L. Lv, Z. Ding, Q. Ni, and J. Chen, “Secure MISO-NOMA transmission with artificial noise,” IEEE Trans. Veh. Technol., vol. 67, no. 7, pp. 6700–6705, Jul. 2018.
- J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure communications in MIMO relay networks,” IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871–4884, Oct. 2011.
- Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, “On the application of cooperative transmission to secrecy communications,” IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359–368, Feb. 2012.
- A. Mukherjee and A. L. Swindlehurst, “Detecting passive eavesdroppers in the MIMO wiretap channel,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Kyoto, Japan, Mar. 2012.
- H. Sun, F. Zhou, R. Q. Hu, and L. Hanzo, “Robust beamforming design in a NOMA cognitive radio network relying on SWIPT,” IEEE J. Sel. Areas Commun., vol. 31, no. 1, pp. 142–155, Jan. 2019.
- Y. Sun, D. W. K. Ng, J. Zhu, and R. Schober, “Robust and secure resource allocation for full-duplex MISO multicarrier NOMA systems,” IEEE Trans. Commun., vol. 66, no. 9, pp. 4119–4137, Sep. 2018.
- H. Fu, W. Tang, D. W. K. Ng, “Robust secure beamforming design for two-user downlink MISO rate-splitting systems,” IEEE Trans. Wireless Commun., vol. 19, no. 12, pp. 8351–8365, Dec. 2020.
- Z. Yang, D. Li, N. Zhao, Z. Wu, Y. Li and D. Niyato, “Secure precoding optimization for NOMA-aided integrated sensing and communication,” IEEE Trans. Commun., vol. 70, no. 12, pp. 8370–8382, Dec. 2022.
- D. Luo, Z. Ye, and J. Zhu, “Secure transmit beamforming for radar-communication systems using NOMA,” IEEE Commun. Lett., vol. 26, no. 11, pp. 2557–2561, Nov. 2022.
- A. Khisti and G. Wornell, “Secure transmission with multiple antennas-I: The MISOME wiretap channel,” IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088–3104, Jul. 2010.
- H.-M. Wang, T.-X. Zheng, and X.-G. Xia, “Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. artificial fast fading,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 94–106, Jan. 2015.
- X. Li, J. Hwu, and E. Ratazzi, “Using antenna array redundancy and channel diversity for secure wireless transmissions,” J. Commun., vol. 2, no. 3, pp. 24–32, May 2007.
- B. Li, W. Wu, W. Zhao, and H. Zhang, “Security enhancement with a hybrid cooperative NOMA scheme for MEC system,” IEEE Trans. Veh. Technol., vol. 70, no. 3, pp. 2635–2648, Mar. 2021.
- W. Wu, F. Zhou, R. Q. Hu, and B. Wang, “Energy-efficient resource allocation for secure NOMA-enabled mobile edge computing networks,” IEEE Trans. Commun., vol. 68, no. 1, pp. 493–505, Mar. 2020.
- X. Lia, L. Fan, X. Lei, Y. Deng, G. K. Karagiannidis, and A. Nallanathan, “Secure mobile edge computing networks in the presence of multiple eavesdroppers,” IEEE Trans. Commun., vol. 70, no. 1, pp. 500–513, Jan. 2022.
- H. Lu and Y. Zeng, “Communicating with extremely large-scale array/surface: Unified modeling and performance analysis,” IEEE Trans. Wireless Commun., vol. 21, no. 6, pp. 4039–4053, Jun. 2022.
- H. Zhang, N. Shlezinger, F. Guidi, D. Dardari, M. Imani, and Y. Eldar, “Beam focusing for near-field multiuser MIMO communications,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 7476–7490, Sep. 2022.
- M. Cui, Z. Wu, X. Wei, and L. Dai, “Near-field MIMO communications for 6G: Fundamentals, challenges, potentials, and future directions,” IEEE Commun. Mag., vol. 61, no. 1, pp. 40–46, Jan. 2023.
- Y. Liu, J. Xu, Z. Wang, X. Mu, and L. Hanzo, “Near-field communications: What will be different?” arXiv: 2303.04003v1, Mar. 2023.
- G. J. Anaya-Lopez, J. P. Gonzalez-Coma, and F. J. Lopez-Martinez, “Spatial degrees of freedom for physical layer security in XL-MIMO,” in Proc. IEEE Vehicular Technology Conference (VTC2022-Spring), Helsinki, Finland, 2022, pp. 1–5
- Z. Zhang, Z. Wang, X. Mu, and Y. Liu, “Physical layer security in near-field communications: What will be changed?” arXiv:2302.04189, 2023.
- L. N. Ribeiro, S. Schwarz, and M. Haardt, “Low-complexity zero-forcing precoding for XL-MIMO transmissions,” in Proc. IEEE Eur. Signal Process. Conf., Aug. 2021, pp. 1621–1625.
- F. Sohrabi and W. Yu, “Hybrid analog and digital beamforming for mmWave OFDM large-scale antenna arrays,” IEEE J. Sel. Areas Commun., vol. 35, no. 7, pp. 1432–1443, Jul. 2017.
- X. Tian, Q. Liu, Z. Wang, and M. Li, “Secure hybrid beamformers design in mmWave MIMO wiretap systems,” IEEE Systems Journal, vol. 14, no. 1, pp. 548–559, Mar. 2020.
- L. Dai, B. Wang, M. Peng, and S. Chen, “Hybrid precoding-based millimeter-wave massive MIMO-NOMA with simultaneous wireless information and power transfer,” IEEE J. Sel. Areas Commun., vol. 37, no. 1, pp. 131–141, Jan. 2019.
- L. Zhu, J. Zhang, Z. Xiao, X. Cao, D. O. Wu, and X.-G. Xia, “Millimeter-wave NOMA with user grouping, power allocation and hybrid beamforming,” IEEE Trans. Wireless Commun., vol. 18, no. 11, pp. 5065–5079, Nov. 2019.
- P.-H. Chang and T.-D. Chiueh, “Hybrid beamforming for wideband terahertz massive MIMO Communications with low-resolution phase shifters and true-time-delay,” IEEE Trans. Wireless Commun., to appear in 2024.
- Z. Wang, M. Li, Q. Liu, and A. L. Swindlehurst, “Hybrid precoder and combiner design with low resolution phase shifters in mmWave MIMO systems,” IEEE J. Sel. Topics Signal Process., vol. 12, no. 2, pp. 256–269, May 2018.
- M. P. Daly and J. T. Bernhard, “Directional modulation technique for phased arrays,” IEEE Trans. Antennas Propag., vol. 57, no. 9, pp. 2633–2640, Sep. 2009.
- Y. Ding and V. Fusco, “A review of directional modulation technology,” Int. J. Microw. Wirel. Technol., vol. 8, no. 7, pp. 981–993, Jul. 2016.
- O. N. Alrabadi and G. F. Pedersen, “Directional space-time modulation: A novel approach for secured wireless communication,” in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2012, pp. 3554–3558.
- P. F. Sammartino, C. J. Baker, and H. D. Griffiths, “Frequency diverse MIMO techniques for radar,” IEEE Trans. Aerosp. Electron. Syst., vol. 49, no. 1, pp. 201–222, Jan. 2013.
- Y. Liu, H. Ruan, L. Wang, and A. Nehorai, “The random frequency diverse array: A new antenna structure for uncoupled direction-range indication in active sensing,” IEEE J. Sel. Top. Signal Process., vol. 11, no. 2, pp. 295–308, Feb. 2017.
- T. Hong, M.-Z. Song, and Y. Liu, “Dual-beam directional modulation technique for physical-layer secure communication,” IEEE Antennas Wireless Propag. Lett., vol. 10, pp. 1417–1420, Oct. 2011.
- S. Asaad, A. Bereyhi, A. M. Rabiei, R. R. Muller, and R. F. Schaefer, “Optimal transmit antenna selection for massive MIMO wiretap channels,” IEEE J. Sel. Areas Commun., vol. 36, no. 4, pp. 817–828, Apr. 2018.
- J. Zhu, Y. Zou, G. Wang, Y.-D. Yao, and G. K. Karagiannidis, “On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping,” IEEE Trans. Veh. Technol., vol. 65, no. 1, pp. 214–225, Jan. 2016.
- D. He, C. Liu, T. Q. S. Quek, and H. Wang, “Transmit antenna selection in MIMO wiretap channels: A machine learning approach,” IEEE Wireless Commun. Lett., vol. 7, no. 4, pp. 634–637, Aug. 2018.
- X. Pei, H. Yu, M. Wen, Q. Li, and Z. Ding, “Secure outage analysis for cooperative NOMA systems with antenna selection,” IEEE Trans. Veh. Technol., vol. 69, no. 4, pp. 4503–4507, Apr. 2020.
- H. Gao, Y. Su, S. Zhang, Y. Hou, and M. Jo, “Joint antenna selection and power allocation for secure co-time co-frequency full-duplex massive MIMO systems,” IEEE Trans. Veh. Technol., vol. 70, no. 1, pp. 655–665, Jan. 2021.
- K. Cao, B. Wang, H. Ding, L. Lv, J. Tian, and F. Gong, “On the security enhancement of uplink NOMA systems with jammer selection,” IEEE Trans. Commun., vol. 68, no. 9, pp. 5747–5763, Sep. 2020.
- Y. Feng, S. Yan, C. Liu, Z. Yang, and N. Yang, “Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 6, pp. 1670–1683, Jun. 2019.
- B. Li, X. Qi, K. Huang, Z. Fei, F. Zhou, and R. Q. Hu, “Security-reliability tradeoff analysis for cooperative NOMA in cognitive radio networks,” IEEE Trans. Commun., vol. 67, no. 1, pp. 83–96, Jan. 2019.
- K. Cao, B. Wang, H. Ding, T. Li, and F. Gong, “Optimal relay selection for secure NOMA systems under untrusted users,” IEEE Trans. Veh. Technol., vol. 69, no. 2, pp. 1942–1955, Feb. 2020.
- L. Fan, X. Lei, T. Q. Duong, M. Elkashlan, and G. K. Karagiannidis, “Secure multiuser communications in multiple amplify-and-forward relay networks,” IEEE Trans. Commun., vol. 62, no. 9, pp. 3299–3310, Sep. 2014.
- G. Chen, Z. Tian, Y. Gong, Z. Chen, and J. A. Chambers, “Max-ratio relay selection in secure buffer-aided cooperative wireless networks,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 719–729, Apr. 2014.
- M. Alkhawatrah, Y. Gong, G. Chen, S. Lambotharan, and J. A. Chambers, “Buffer-aided relay selection for cooperative NOMA in the Internet of Things,” IEEE Internet of Things J., vol. 6, no. 3, pp. 5722–5731, Jun. 2019.
- J. Ren, X. Lei, and P. T. Mathiopoulos, “Jointly adaptive distributed beamforming and resource allocation for buffer-aided multiple-relay NOMA networks,” IEEE Trans. Commun., vol. 69, no. 11, pp. 7063–7617, Nov. 2021.
- H.-M. Wang, F. Liu, and X.-G. Xia, “Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240–1250, Aug. 2014.
- L. Chai, L. Bai, T. Bai, J. Shi, and A. Nallanathan, “Secure RIS-aided MISO-NOMA system design in the presence of active eavesdropping,” IEEE Internet of Things J., vol. 10, no. 22, pp. 19479–19494, Nov. 2023.
- L. Yang, J. Chen, H. Jiang, S. A. Vorobyov, and H. Zhang, “Optimal relay selection for secure cooperative communications with an adaptive eavesdropper,” IEEE Trans. Wireless Commun., vol. 16, no. 1, pp. 26–42, Jan. 2017.
- H.-M. Wang, Q. Yin, and X.-G. Xia, “Distributed beamforming for physical-layer security of two-way relay networks,” IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532–3545, Jul. 2012
- Z. Gao, Z. Huang, and L. Sun, “Secure cooperative communication with nondedicated relays,” IEEE Trans. Veh. Technol., vol. 67, no. 8, pp. 7811–7815, Aug. 2018.
- C. Wang, H.-M. Wang, and X.-G. Xia, “Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks,” IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589–605, Feb. 2015.
- H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, “Secure relay and jammer selection for physical layer security,” IEEE Signal Process. Lett., vol. 22, no. 8, pp. 1147–1151, Aug. 2015.
- C. Yu, H.-L. Ko, X. Peng, W. Xie, and P. Zhu, “Jammer-aided secure communications for cooperative NOMA systems,” IEEE Commun. Lett., vol. 23, no. 11, pp. 1935–1939, Nov. 2019.
- Q. Li, P. Ren, Q. Du, D. Xu, and Y. Xie, “Safeguarding NOMA enhanced cooperative D2D communications via friendly jamming,” in Proc. IEEE 90th Veh. Technol. Conf. (VTC-Fall), Honolulu, HI, USA, 2019, pp. 1–5.
- E. R. Alotaibi and K. A. Hamdi, “Optimal cooperative relaying and jamming for secure communication,” IEEE Trans. Wireless Commun., vol. 4, no. 6, pp. 689–692, Dec. 2015.
- J. Yao, X. Zhou, Y. Liu, and S. Feng, “Secure transmission in linear multihop relaying networks,” IEEE Trans. Wireless Commun., vol. 17, no. 2, pp. 822–834, Feb. 2018.
- J.-H. Lee, “Optimal power allocation for physical layer security in multi-hop DF relay networks,” IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 28–38, Jan. 2016.
- J.-H. Lee, “Full-duplex relay for enhancing physical layer security in multi-hop relaying systems,” IEEE Commun. Lett., vol. 19, no. 4, pp. 525–528, Apr. 2015.
- S. Atapattu, N. Ross, Y. Jing, Y. He, and J. S. Evans, “Physical-layer security in full-duplex multi-hop multi-user wireless network with relay selection,” IEEE Trans. Wireless Commun., vol. 18, no. 2, pp. 1216–1232, Feb. 2019.
- X. He and A. Yener, “Cooperation with an untrusted relay: A secrecy perspective,” IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807–3827, Aug. 2010.
- J. Huang, A. Mukherjee, and A. L. Swindlehurst, “Secure communication via an untrusted non-regenerative relay in fading channels,” IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536–2550, May 2013.
- L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, “Secure transmission with optimal power allocation in untrusted relay networks,” IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289–292, Jun. 2014.
- A. Arafa, W. Shin, M. Vaezi, and H. V. Poor, “Secure relaying in non-orthogonal multiple access: Trusted and untrusted scenarios,” IEEE Trans. Inf. Forensics Security, vol. 15, no. 1, pp. 210–222, Jan. 2020.
- Z. Xiang, W. Yang, G. Pan, Y. Cai, and X. Sun, “Secure transmission in non-orthogonal multiple access networks with an untrusted relay,” IEEE Wireless Commun. Lett., vol. 8, no. 3, pp. 905–908, Jun. 2019.
- B. He, L. Lv, L. Yang, and J. Chen, “Enhancing secrecy for NOMA untrusted relay networks with user scheduling and jamming,” IEEE Commun. Lett., vol. 24, no. 12, pp. 2682–2686, Dec. 2020.
- L. Lv, H. Jiang, Z. Ding, L. Yang, and J. Chen, “Secrecy-enhancing design for cooperative downlink and uplink NOMA with an untrusted relay,” IEEE Trans. Commun., vol. 68, no. 3, pp. 1698–1715, Mar. 2020.
- L. Lv, F. Zhou, J. Chen, and N. Al-Dhahir, “Secure cooperative communications with an untrusted relay: A NOMA-inspired jamming and relaying approach,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 12, pp. 3191–3205, Dec. 2019.
- B. He, Q. Ni, J. Chen, L. Yang, and L. Lv, “User-pair selection in multiuser cooperative networks with an untrusted relay,” IEEE Trans. Veh. Technol., vol. 68, no. 1, pp. 869–882, Jan. 2019.
- Q. Wu, W. Mei, and R. Zhang, “Safeguarding wireless network with UAVs: A physical layer security perspective,” IEEE Wireless Commun., vol. 26, no. 5, pp. 12–18, Oct. 2019.
- F. Cheng, G. Gui, N. Zhao, Y. Chen, J. Tang, and H. Sari, “UAV-relaying-assisted secure transmission with caching,” IEEE Trans. Commun., vol. 67, no. 5, pp. 3140–3153, May 2019.
- X. Pang, M. Liu, N. Zhao, Y. Chen, Y. Li, and F. R. Yu, “Secrecy analysis of UAV-based mmWave relaying networks,” IEEE Trans. Wireless Commun., vol. 20, no. 8, pp. 4990–5002, Aug. 2021.
- A. Li, Q. Wu, and R. Zhang, “UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel,” IEEE Wireless Commun. Lett., vol. 8, no. 1, pp. 181–184, Feb. 2019.
- C. Zhong, J. Yao, and J. Xu, “Secure UAV communication with cooperative jamming and trajectory control,” IEEE Commun. Lett., vol. 23, no. 2, pp. 286–289, Feb. 2019.
- C. Xu, L. Yang, and P. Zhang, “Practical backscatter communication systems for battery-free Internet of Things: A tutorial and survey of recent research,” IEEE Signal Process. Mag., vol. 35, no. 5, pp. 16–27, 2018.
- Y. Ye, L. Shi, X. Chu, and G. Lu, “On the outage performance of ambient backscatter communications,” IEEE Internet Things J., vol. 7, no. 8, pp. 7265–7278, 2020.
- Z. Ding, “Harvesting devices’ heterogeneous energy profiles and QoS requirements in IoT: WPT-NOMA vs BAC-NOMA,” IEEE Trans. Commun., vol. 69, no. 5, pp. 2837–2850, 2021.
- W. Saad, X. Zhou, Z. Han, and H. V. Poor, “On the physical layer security of backscatter wireless systems,” IEEE Trans. Wireless Commun., vol. 13, no. 6, pp. 3442–3451, 2014.
- P. Wang, Z. Yan, N. Wang, and K. Zeng, “Resource allocation optimization for secure multidevice wirelessly powered backscatter communication with artificial noise,” IEEE Trans. Wireless Commun., vol. 21, no. 9, pp. 7794–7809, 2022.
- Q. Yang, H.-M. Wang, Y. Zhang, and Z. Han, “Physical layer security in MIMO backscatter wireless systems,” IEEE Trans. Wireless Commun., vol. 15, no. 11, pp. 7547–7560, 2016.
- L. Bai, Q. Chen, T. Bai, and J. Wang, “UAV-enabled secure multiuser backscatter communications with planar array,” IEEE J. Sel. Areas Commun., vol. 40, no. 10, pp. 2946–2961, 2022.
- B. Lyu, C. Zhou, S. Gong, D. T. Hoang, and Y.-C. Liang, “Robust secure transmission for active RIS enabled symbiotic radio multicast communications,” IEEE Trans. Wireless Commun., vol. 22, no. 12, pp. 8766–8780, 2023.
- Y. Xu, R. Xu, D. Li, G. Yang, G. Wang, C. Yuen, and J. Zhou, “Robust resource allocation for wireless-powered backscatter communication systems with noma,” IEEE Trans. Veh. Technol., vol. 72, no. 9, pp. 12 288–12 299, 2023.
- Z. Liu, Y. Ye, X. Chu, and H. Sun, “Secrecy performance of backscatter communications with multiple self-powered tags,” IEEE Commun. Lett., vol. 26, no. 12, pp. 2875–2879, 2022.
- Q. Wu and R. Zhang, “Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network,” IEEE Commun. Mag., vol. 58, no. 1, pp. 106–112, Jan. 2020.
- Y. Liu, X. Liu, X. Mu, T. Hou, J. Xu, M. D. Renzo, and N. Al-Dhahir, “Reconfigurable intelligent surfaces: Principles and opportunities,” IEEE Commun. Surv. Tut., vol. 23, no. 3, pp. 1546–1577, 3rd Quarter, 2021.
- L. Yang, J. Wang, X. Xue, J. Shi, and Y. Wang, “Secure hybrid beamforming for IRS-assisted millimeter wave systems,” IEEE Trans. Wireless Commun., vol. 22, no. 8, pp. 5111–5128, Aug. 2023.
- L. Lv, Q. Wu, Z. Li, N. Al-Dhahir, and J. Chen, “Secure two-way communications via intelligent reflecting surfaces,” IEEE Commun. Lett., vol. 25, no. 3, pp. 744–748, Mar. 2021.
- J. Luo, F. Wang, S. Wang, H. Wang, and D. Wang, “Reconfigurable intelligent surface: Reflection design against passive eavesdropping,” IEEE Trans. Wireless Commun., vol. 20, no. 5, pp. 3350–3364, May 2021.
- Q. Wang, F. Zhou, R. Q. Hu, and Y. Qian, “Energy efficient robust beamforming and cooperative jamming design for IRS-assisted MISO networks,” IEEE Trans. Wireless Commun., vol. 20, no. 4, pp. 2592–2607, Mar. 2021.
- Z. Zhang, L. Lv, Q. Wu, H. Deng, and J. Chen, “Robust and secure communications in intelligent reflecting surface assisted NOMA networks,” IEEE Commun. Lett., vol. 25, no. 3, pp. 739–743, Mar. 2021.
- Y. Feng, J. Chen, X. Xue, K. Wu, Y. Zhou, and L. Yang, “Max-Min Fair Beamforming for IRS-Aided Secure NOMA Systems,” IEEE Commun. Lett., vol. 26, no. 2, pp. 234–238, Feb. 2022.
- Z. Zhang, J. Chen, Q. Wu, Y. Liu, L. Lv, and X. Su, “Securing NOMA networks by exploiting intelligent reflecting surface,” IEEE Trans. Commun., vol. 70, no. 2, pp. 1096–1111, Feb. 2022.
- E. Basar, M. D. Renzo, J. de Rosny, M. Debbah, M.-S. Alouini, and R. Zhang, “Wireless communications through reconfigurable intelligent surfaces,” IEEE Access, vol. 7, pp. 116753–116773, 2019.
- S. Lin, B. Zheng, G. C. Alexandropoulos, M. Wen, M. D. Renzo, and F. Chen, “Reconfigurable intelligent surfaces with reflection pattern modulation: Beamforming design and performance analysis,” IEEE Trans. Wireless Commun., vol. 20, no. 2, pp. 741–754, Feb. 2021.
- E. Basar, “Reconfigurable intelligent surface-based index modulation: A new beyond MIMO paradigm for 6G,” IEEE Trans. Commun., vol. 68, no. 5, pp. 3187–3196, May 2020.
- S. Xu, J. Liu, and Y. Cao, “Intelligent reflecting surface empowered physical-layer security: Signal cancellation or jamming?” IEEE Internet Things J., vol. 9, no. 2, pp. 1265–1275, Jan. 2023.
- Y. Wu, J. Luo, W. Chen, and S. Wang, “Passive secure communications based on reconfigurable intelligent surface,” IEEE Commun. Lett., vol. 27, no. 2, pp. 472–476, Feb. 2023.
- M. Ji, J. Chen, L. Lv, Q. Wu, Z. Ding, and N. Al-Dhahir, “Secure NOMA systems with a dual-functional RIS: Simultaneous information relaying and jamming,” IEEE Trans. Commun., vol. 71, no. 11, pp. 6514–6528, Nov. 2023.
- L. Dong, H.-M Wang, and J. Bai, “Active reconfigurable intelligent surface aided secure transmission,” IEEE Trans. Veh. Technol., vol. 71, no. 2, pp. 2181–2186, Feb. 2022.
- Y. Guo, Y. Liu, Q. Wu, Q. Shi, and Y. Zhao, “Enhanced secure communication via novel double-faced active RIS,” IEEE Trans. Commun., vol. 71, no. 6, pp. 3497–3512, Jun. 2023.
- H. Luo, L. Lv, Q. Wu, Z. Ding, N. Al-Dhahir, and J. Chen, “Beamforming design for active IOS aided NOMA networks,” IEEE Wireless Commun. Lett., vol. 12, no. 2, pp. 282–286, Feb. 2023.
- M. Ji, J. Chen, L. Lv, Y. Ye, H. Luo, and Z. Ding, “Securing NOMA by an active RIS: Joint reflection and jamming design,” in Proc. IEEE ICCC, 2023, pp. 1–6.
- Z. Zhang, J. Chen, Y. Liu, Q. Wu, B. He, and L. Yang, “On the secrecy design of STAR-RIS assisted uplink NOMA networks,” IEEE Trans. Wireless Commun., vol. 21, no. 12, pp. 11207–11221, Dec. 2022.
- L. Lv, H. Luo, Z. Li, Q. Wu, Z. Ding, N. Al-Dhahir, and J. Chen, “Self-sustainable intelligent omni-surface aided wireless networks: Protocol design and resource allocation,” IEEE Trans. Wireless Commun., to appear in 2024.
- H. Luo, L. Lv, Z. Yang, Q. Wu, N. Al-Dhahir, and J. Chen, “Intelligent omni-surface aided rate splitting multiple access,” IEEE Wireless Commun. Lett., vol. 12, no. 11, pp. 1901–1905, Nov. 2023.
- O’shea, Timothy, and Jakob Hoydis, “An introduction to deep learning for the physical layer,” IEEE Transactions on Cognitive Communications and Networking, vol. 3, no. 4, pp. 563-575, Dec. 2017.
- W. Lee, M. Kim and D.-H. Cho, “Deep power control: Transmit power control scheme based on convolutional neural network,” IEEE Communications Letters, vol. 22, no. 6, pp. 1276-1279, June 2018.
- K. Kim, J. Lee and J. Choi, “Deep learning based pilot allocation scheme (DL-PAS) for 5G massive MIMO system,” IEEE Communications Letters, vol. 22, no. 4, pp. 828-831, April 2018.
- C.-K. Wen, W.-T. Shih and S. Jin, “Deep learning for massive MIMO CSI feedback,” IEEE Wireless Communications Letters, vol. 7, no. 5, pp. 748-751, Oct. 2018.
- U. Sallakh, S. S. Mwanje and A. Mitschele-Thiel, “Multi-parameter Q-learning for downlink inter-cell interference coordination in LTE son,” in 2014 IEEE Symposium on Computers and Communications (ISCC), Funchal, Portugal, 2014, pp. 1-6.
- R. Amiri, H. Mehrpouyan, L. Fridman, R. K. Mallik, A. Nallanathan and D. Matolak, “A machine learning approach for power allocation in HetNets considering QoS,” in 2018 IEEE International Conference on Communications (ICC), 2018.
- Y. S. Nasir and D. Guo, “Multi-agent deep reinforcement learning for dynamic power allocation in wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 10, pp. 2239-2250, Oct. 2019.
- T. Van Chien, T. Nguyen Canh, E. Bjornson and E. G. Larsson, “Power control in cellular massive MIMO with varying user activity: A deep learning solution,” IEEE Transactions on Wireless Communications, vol. 19, no. 9, pp. 5732-5748, Sept. 2020.
- D. Xu, P. Ren, and J. A. Ritcey, “PHY-layer cover-free coding for wireless pilot authentication in IoV communications: Protocol design and ultra-security proof,” IEEE Internet Things J., vol. 6, no. 1, pp. 171–187, Feb. 2019.
- D. Xu, P. Ren, and J. A. Ritcey, “Independence-checking coding for OFDM channel training authentication: Protocol design, security, stability, and tradeoff analysis,” IEEE Trans. Inf. Forensics Security, vol.14, no. 2, pp. 387–402, Feb. 2019.
- D. Xu, P. Ren, J. A. Ritcey, and Y. Wang, “Code-frequency block group coding for anti-spoofing pilot authentication in multi-antenna OFDM systems,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 7, pp. 1778–1793 Jul. 2018.
- L. Hanzo, H. Haas, S. Imre, D. O’Brien, M. Rupp, and L. Gyongyosi, “Wireless myths, realities, and futures: from 3G/4G to optical and quantum wireless,” Proc. IEEE, vol. 100, no. Special Centennial Issue, pp. 1853–1888, May 2012.
- S. Yan, R. Malaney and J. Yuan, “Generalized and differential likelihood ratio tests with quantum signal processing,” in ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 2019, pp. 7998-8002.
- R. Yuan and J. Cheng, “Free-space optical quantum BPSK communications in turbulent channels,” in 2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, 2018, pp. 1-6.
- M. Cvijetic and Y. Takashima, “Beyond 1Mb/s free-space optical quantum key distribution,” in 2014 16th international conference on transparent optical networks (ICTON), Graz, Austria, 2014, pp. 1-4.
- Nguyen, Hung Viet, et al, “Network coding aided cooperative quantum key distribution over free-space optical channels,” IEEE Access, vol. 5, pp. 12301-12317, 2017.
- P. V. Trinh, T. V. Pham, N. T. Dang, H. V. Nguyen, S. X. Ng, and A. T. Pham, “Design and security analysis of quantum key distribution protocol over free-space optics using dual-threshold direct-detection receiver,” IEEE Access, vol. 6, pp. 4159-4175, 2018.
- M. Razavi, “Multiple-access quantum key distribution networks,” IEEE Transactions on Communications, vol. 60, no. 10, pp. 3071–3079, October 2012.
- Patel, K. A., et al, “Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks,” Applied Physics Letters, vol. 104, 2014.
- Anandan, Mukund, Saumya Choudhary, and K. Pradeep Kumar, “OFDM for frequency coded quantum key distribution,” in 2012 International Conference on Fiber Optics and Photonics (PHOTONICS), Chennai, India, 2012, pp. 1–3.
- C. Wang, Z. Li, J. Shi, and D. W. K. Ng, “Intelligent reflecting surface-assisted multi-antenna covert communications: Joint active and passive beamforming optimization,” IEEE Trans. Commun., vol. 69, no. 6, pp. 3984–4000, Jun. 2021.
- Y. Zhang, B. Ning, W. Ni, J. Wang, W. Tang, and D. Niyato, “Exploiting faster-than-Nyquist signaling for MIMO covert communications: A low-complexity design,” IEEE Trans. Veh. Technol., to appear in 2024.
- L. Bai, J. Xu, and L. Zhou, “Covert communication for spatially sparse mmWave massive MIMO channels,” IEEE Trans. Commun., vol. 71, no. 3, pp. 1615–1630, Mar. 2023.
- Y. Zhang, Y. Zhang, J. Wang, S. Xiao, W. Ni, and W. Tang, “Robust beamfocusing for FDA-aided near-field covert communications with uncertain location,” in Proc IEEE International Conference on Communications Workshops (ICC Workshops), Rome, Italy, 2023, pp. 1349–1354.
- Z. Xing, C. Qi, Y. Cheng, Y. Wu, D. Lv, and P. Li, “Covert millimeter wave communications based on beam sweeping,” IEEE Commun. Lett., vol. 27, no. 5, pp. 1287–1291, May 2023.
- W. Ci, C. Qi, G. Y. Li, and S. Mao, “Hybrid beamforming design for covert multicast mmWave massive MIMO communications,” in Proc. IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, 2021, pp. 1–6.
- C. Wang, Z. Li, and D. W. K. Ng, “Covert rate optimization of millimeter wave full-duplex communications,” IEEE Trans. Wireless Commun., vol. 21, no. 5, pp. 2844–2861, May 2022.
- Y. Jiang, L. Wang, and H.-H. Chen, “Covert communications in D2D underlaying cellular networks with antenna array assisted artificial noise transmission,” IEEE Trans. Veh. Technol., vol. 69, no. 3, pp. 2980–2992, Mar. 2020.
- T.-X. Zheng, Z. Yang, C. Wang, Z. Li, J. Yuan, and X. Guan, “Wireless covert communications aided by distributed cooperative jamming over slow fading channels,” IEEE Trans. Wireless Commun., vol. 20, no. 11, pp. 7026–7039, Nov. 2021.
- C. Gao, B. Yang, D. Zheng, X. Jiang, and T. Taleb, “Cooperative jamming and relay selection for covert communications in wireless relay systems,” IEEE Trans. Commun., to appear in 2023.
- L. Lv, Z. Li, H. Ding, N. Al-Dhahir, and J. Chen, “Achieving covert wireless communication with a multi-antenna relay,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 760–773, 2022.
- R. Ma, W. Yang, H. Shi, X. Lu, and J. Liu, “Covert communication with a spectrum sharing relay in the finite blocklength regime,” China Communications, vol. 20, no. 4, pp. 195–211, Apr. 2023.
- M. Lin, C. Liu, and W. Wang, “Relay-assisted uplink covert communication in the presence of multi-antenna warden and uninformed jamming,” IEEE Trans. Commun., to appear in 2023.
- C. Gao, B. Yang, X. Jiang, H. Inamura, and M. Fukushi, “Covert communication in relay-assisted IoT systems,” IEEE Internet Things J., vol. 8, no. 8, pp. 6313–6323, Apr. 2021.
- R. Chen, Z. Li, J. Shi, L. Yang, and J. Hu, “Achieving covert communication in overlay cognitive radio networks,” IEEE Trans. Veh. Technol., vol. 69, no. 12, pp. 15113–15126, Dec. 2020.
- J. Bai, J. He, Y. Chen, Y. Shen, and X. Jiang, “On covert communication performance with outdated CSI in wireless greedy relay systems,” IEEE Trans. Inf. Forensics Security, vol. 17, pp. 2920–2935, 2022.
- J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Trans. Wireless Commun., vol. 17, no. 7, pp. 4766–4779, Jul. 2018.
- B. Yang, T. Taleb, Y. Fan, and S. Shen, “Mode selection and cooperative jamming for covert communication in D2D underlaid UAV networks,” IEEE Network, vol. 35, no. 2, pp. 104–111, Mar./Apr. 2021.
- Y. Jiang, L. Wang, H. Zhao, and H.-H. Chen, “Covert communications in D2D underlaying cellular networks with power domain NOMA,” IEEE System Journal, vol. 14, no. 3, pp. 3717–3728, Sep. 2020.
- Q. Li, D. Xu, K. Navaie, and Z. Ding, “Covert and secure communications in NOMA networks with internal eavesdropping,” IEEE Wireless Commun. Lett., vol. 12, no. 12, pp. 2178–2182, Dec. 2023.
- L. Tao, W. Yang, X. Lu, M. Wang, and Y. Song, “Achieving covert communication in uplink NOMA systems via energy harvesting jammer,” IEEE Wireless Commun. Lett., vol. 25, no. 12, pp. 3785–3789, Dec. 2021.
- S. Weber, J. G. Andrews, and N. Jindal, “The effect of fading, channel inversion, and threshold scheduling on ad hoc networks,” IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 4127–4149, Nov. 2007.
- C. B. Peel, B. M. Hochwald, and A. L. Swindlehurst, “A vector-perturbation technique for near-capacity multiantenna multiuser communication-part I: Channel inversion and regularization,” IEEE Trans. Commun., vol. 53, no. 1, pp. 195–202, Jan. 2005.
- M. Wang, W. Yang, X. Lu, C. Hu, B. Liu, and X. Lv, “Channel inversion power control aided covert communications in uplink NOMA systems,” IEEE Wireless Commun. Lett., vol. 11, no. 4, pp. 871–875, Apr. 2022.
- R. Ma, X. Yang, G. Pan, X. Guan, Y. Zhang, and W. Yang, “Covert communications with channel inversion power control in the finite blocklength regime,” IEEE Wireless Commun. Lett., vol. 10, no. 4, pp. 835–839, Apr. 2021.
- J. Hu, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert wireless communications with channel inversion power control in rayleigh fading,” IEEE Trans. Veh. Tech., vol. 68, no. 12, pp. 12135–12149, Dec. 2019.
- L. Tao, W. Yang, S. Yan, D. Wu, X. Guan, and D. Chen, “Covert communication in downlink NOMA systems with random transmit power,” IEEE Wireless Commun. Lett., vol. 9, no. 11, pp. 2000–2004, Nov. 2020.
- N. T. Hai and D. L. Khoa, “Preserving covert communication in downlink NOMA systems via reradiating on antennas,” IEEE Commun. Lett., vol. 27, no. 11, pp. 3098–3102, Nov. 2023.
- Z. Duan, X. Yang, Y. Gong, D. Wang, and L. Wang, “Covert communication in uplink NOMA systems under channel distribution information uncertainty,” IEEE Commun. Lett., vol. 27, no. 5, pp. 1282–1286, May 2023.
- X. Lu, E. Hossain, T. Shafique, S. Feng, H. Jiang, and D. Niyato, “Intelligent reflecting surface enabled covert communications in wireless networks,” IEEE Network, vol. 34, no. 5, pp. 148–155, Sep. 2020.
- M. Li, X. Tao, N. Li, and H. Wu, “Energy-efficient covert communication with the aid of aerial reconfigurable intelligent surface,” IEEE Commun. Lett., vol. 26, no. 9, pp. 2101–2105, Sep. 2022.
- Y. Wu, S. Wang, J. Luo, and W. Chen, “Passive covert communications based on reconfigurable intelligent surface,” IEEE Wireless Commun. Lett., vol. 11, no. 11, pp. 2445–2449, Nov. 2022.
- J. Si, Z. Li, Y. Zhao, J. Cheng, L. Guan, J. Shi, and N. Al-Dhahir, “Covert transmission assisted by intelligent reflecting surface,” IEEE Trans. Commun., vol. 69, no. 8, pp. 5394–5408, Aug. 2021.
- X. Zhou, S. Yan, Q. Wu, F. Shu, and D. W. K. Ng, “Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 532–547, Jan. 2022.
- L. Lv, Q. Wu, Z. Li, Z. Ding, N. Al-Dhahir, and J. Chen, “Achieving covert communication by IRS-NOMA,” in Proc. IEEE/CIC Int. Conf. Commun. China (ICCC), Jul. 2021, pp. 421–426.
- Y. Sun, H. Xu, C. Ouyang, and H. Yang, “Sum-rate optimization for RIS-aided multiuser communications with movable antenna,” arXiv:2311.06501, 2023.
- G. Hu, Q. Wu, D. Xu, K. Xu, J. Si, Y. Cai, and N. Al-Dhahir, “Intelligent reflecting surface-aided wireless communication with movable elements,” arXiv:2311.02376, 2023.
- L. Zhu, W. Ma, and R. Zhang, “Movable-antenna array enhanced beamforming: Achieving full array gain with null steering,” IEEE Commun. Lett., vol. 27, no. 12, pp. 3340–3344, Dec. 2023.
- J. Liu, J. Yu, D. Niyato, R. Zhang, X. Gao, and J. An, “Covert ambient backscatter communications with multi-antenna tag,” IEEE Trans. Wireless Commun., vol. 22, no. 9, pp. 6199–6212, Sep. 2023.
- J. Liu, J. Yu, R. Zhang, S. Wang, K. Yang, and J. An, “Covert MIMO ambient backscatter communication,” IEEE Trans. Commun., pp. 1–1, 2023.
- K. Shahzad and X. Zhou, “Covert communication in backscatter radio,” in Proc. IEEE ICC, 2019, pp. 1–6.
- Y. Wang, S. Yan, W. Yang, Y. Huang, and C. Liu, “Energy-efficient covert communications for bistatic backscatter systems,” IEEE Trans. Veh. Technol., vol. 70, no. 3, pp. 2906–2911, Mar. 2021.
- W. He, J. Chen, G. Li, Y. Xu, R. He, H. Wang, and Y. Jiao, “Covert ambient backscatter communications with information transmission time uncertainty,” IEEE Wireless Commun. Lett., pp. 1–1, 2023.
- Y.-C. Liang, Q. Zhang, E. G. Larsson, and G. Y. Li, “Symbiotic radio: Cognitive backscattering communications for future wireless networks,” IEEE Trans. Cogn. Commun. Netw., vol. 6, no. 4, pp. 1242–1255, Apr. 2020.
- DARPA. (2016). Shared Spectrum Access for Radar and Communications (SSPARC). https://www.darpa.mil/program/shared-spectrum-access-for-radar-and-communications.
- Z. Wang, Y. Liu, X. Mu, Z. Ding, and O. A. Dobre, “NOMA empowered integrated sensing and communication,” IEEE Commun. Lett., vol. 26, no. 3, pp. 677–681, Mar. 2022.
- X. Mu, Y. Liu, L. Guo, J. Lin, and L. Hanzo, “NOMA-aided joint radar and multicast-unicast communication systems,” IEEE J. Sel. Areas Commun., vol. 40, no. 6, pp. 1978–1992, Jun. 2022.
- C. Dou, N. Huang, Y. Wu, L. Qian, and T. Q. S. Quek, “Sensing-efficient NOMA-aided integrated sensing and communication: A joint sensing scheduling and beamforming optimization,” IEEE Trans. Veh. Technol., vol. 72, no. 10, pp. 13591–13603, Oct. 2023.
- Z. Wei, F. Liu, C. Masouros, N. Su, and A. P. Petropulu, “Toward multi-functional 6G wireless networks: Integrating sensing, communication, and security,” IEEE Commun. Mag., vol. 60, no. 4, pp. 65–71, Apr. 2022.
- N. Su, F. Liu, and C. Masouros, “Secure radar-communication systems with malicious targets: Integrating radar, communications and jamming functionalities,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 83–95, Jan. 2021.
- N. Su, F. Liu, and C. Masouros, “Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security,” IEEE Trans. Wireless Commun., to appear in 2024.
- D. Xu, X. Yu, D. W. K. Ng, A. Schmeink, and R. Schober, “Robust and secure resource allocation for isac systems: A novel optimization framework for variable-length snapshots,” IEEE Trans. Commun., vol. 70, no. 12, pp. 8196–8214, Dec. 2022.
- M. Hua, Q. Wu, W. Chen, O. A. Dobre, and A. L. Swindlehurst, “Secure intelligent reflecting surface-aided integrated sensing and communication,” IEEE Trans. Wireless Commun., vol. 23, no. 1, pp. 575–591, Jan. 2024.
- Z. Yang, D. Li, N. Zhao, Z. Wu, Y. Li, and D. Niyato, “Secure precoding optimization for NOMA-aided integrated sensing and communication,” IEEE Trans. Commun., vol. 70, no. 12, pp. 8370–8382, Dec. 2022.
- I. F. Akyildiz, J. M. Jornet, and C. Han, “Terahertz band: Next frontier for wireless communications,” Physical Commun., vol. 12, pp. 16–32, 2014.
- C. Han, W. Gao, N. Yang, and J. M. Jornet, “Molecular absorption effect: A double-edged sword of terahertz communications,” IEEE Wireless Commun., vol. 30, no. 4, pp. 140–146, Aug. 2023.
- H. Burchardt, N. Serafimovski, D. Tsonev, S. Videv, and H. Haas, “VLC: Beyond point-to-point communication,” IEEE Commun. Mag., vol. 52, no. 7, pp. 98–105, Jul. 2014.
- C. Han, A. O. Bicen, and I. F. Akyildiz, “Multi-wideband waveform design for distance-adaptive wireless communications in the Terahertz band,” IEEE Trans. Sig. Proc., vol. 64, no. 4, pp. 910–922, Apr. 2016.
- Z. Hossain and J. M. Jornet, “Hierarchical bandwidth modulation for ultra-broadband terahertz communications,” in Proc. IEEE Int’l. Conf. Commun. (ICC), 2019, pp. 1–7.
- W. Gao, C. Han, and Z. Chen, “DNN-powered SIC-free receiver artificial noise aided terahertz secure communications with randomly distributed eavesdroppers,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 563–576, Jan. 2022.
- Z. Fang, H. Guerboukha, R. Shrestha, M. Hornbuckle, Y. Amarasinghe, and D. M. Mittleman, “Secure communication channels using atmosphere-limited Line-of-Sight terahertz links,” IEEE Transactions on Terahertz Science and Technology, vol. 12, no. 4, pp. 363–369, Jul. 2022.
- F. Zhao, W. Hao, L. Shen, G. Sun, Y. Zhou, and Y. Wang, “Secure energy efficiency transmission for mmWave-NOMA system,” IEEE Systems Journal, vol. 15, no. 2, pp. 2226–2229, Jun. 2021.
- J. Tan and L. Dai, “Wideband beam tracking in THz massive MIMO systems,” IEEE J. Sel. Areas Commun., vol. 39, no. 6, pp. 1693–1710, June. 2021.
- Z. Ding and H. V. Poor, “Design of THz-NOMA in the presence of beam misalignment,” IEEE Comm. Lett., vol. 26, no. 7, pp. 1678–1682, Jul. 2022.
- Z. Ding and H. V. Poor, “Joint beam management and power allocation in THz-NOMA networks” IEEE Trans. Commun., vol. 71, no. 4, pp. 2059–2073, Apr. 2023.
- Z. Ding, “Potentials and limits of using preconfigured spatial beams as bandwidth resources: Beam selection versus beam aggregation” IEEE Wireless Commun. Lett., vol. 11, no. 12, pp. 2575–2579, Dec. 2022.
- F. Gao, L. Xu, and S. Ma, “Integrated sensing and communications with joint beam-squint and beam-split for mmWave/THz massive MIMO,” IEEE Trans. Commun., vol. 71, no. 5, pp. 2963–2976, May 2023.
- H. Luo, F. Gao, W. Yuan, and S. Zhang, “Beam squint assisted user localization in near-field integrated sensing and communications systems,” IEEE Trans. Wireless Commun., to appear in 2024.
- Oppo. Zero-Power Communication. https://www.oppo.com/content/dam/oppo/en/mkt/newsroom/press/oppo-releases-zero-power-communication-whitepaper/white-paper_en.pdf
- S. Naser, L. Bariah, S. Muhaidat, and E. Basar, “Zero-energy devices empowered 6G networks: Opportunities, key technologies, and challenges,” IEEE Internet of Things Mag., vol. 6, no. 3, pp. 44–50, Sep. 2023.
- Y. Liu, D. Li, H. Dai, C. Li, and R. Zhang, “Understanding the impact of environmental conditions on zero-power Internet of Things: An experimental evaluation,” IEEE Wireless Commun., vol. 30, no. 6, pp. 152–159, Dec. 2023.
- E. Basar, “Communication by means of thermal noise: Towards networks with extremely low power consumption,” IEEE Trans. Commun., vol. 71, no. 2, pp. 688–699, Feb. 2023.
- E. Basar, “Noise modulation,” IEEE Wireless Commun. Lett., to appear in 2024.
- Q. Wu, X. Guan, and R. Zhang, “Intelligent reflecting surface-aided wireless energy and information transmission: An overview,” Proc. IEEE, vol. 110, no. 1, pp. 150–170, Jan. 2022.
- H. Sharma and K. Neeraj, “Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey,” Physical Commun., vol. 57, 102002, 2023.
- Lu Lv (16 papers)
- Dongyang Xu (14 papers)
- Rose Qingyang Hu (61 papers)
- Yinghui Ye (23 papers)
- Long Yang (54 papers)
- Xianfu Lei (14 papers)
- Xianbin Wang (124 papers)
- Dong In Kim (168 papers)
- Arumugam Nallanathan (155 papers)