Journal articles on the topic 'Cooperative jamming'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cooperative jamming.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Xu, Yifan, Guochun Ren, Jin Chen, Xiaobo Zhang, Luliang Jia, and Lijun Kong. "Interference-Aware Cooperative Anti-Jamming Distributed Channel Selection in UAV Communication Networks." Applied Sciences 8, no. 10 (October 14, 2018): 1911. http://dx.doi.org/10.3390/app8101911.
Full textFan, Xin, and Yan Huo. "Cooperative secure transmission against collusive eavesdroppers in Internet of Things." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772093346. http://dx.doi.org/10.1177/1550147720933464.
Full textRajaram, Akashkumar, Dushnatha Nalin K. Jayakody, Rui Dinis, and Marko Beko. "Energy Efficient Secure Communication Model against Cooperative Eavesdropper." Applied Sciences 11, no. 4 (February 9, 2021): 1563. http://dx.doi.org/10.3390/app11041563.
Full textWu, Yuandong, and Yan Huo. "A Survey of Cooperative Jamming-Based Secure Transmission for Energy-Limited Systems." Wireless Communications and Mobile Computing 2021 (January 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6638405.
Full textShuangyu Luo, Jiangyuan Li, and A. P. Petropulu. "Uncoordinated Cooperative Jamming for Secret Communications." IEEE Transactions on Information Forensics and Security 8, no. 7 (July 2013): 1081–90. http://dx.doi.org/10.1109/tifs.2013.2261060.
Full textYe, Fang, Fei Che, and Lipeng Gao. "Multiobjective Cognitive Cooperative Jamming Decision-Making Method Based on Tabu Search-Artificial Bee Colony Algorithm." International Journal of Aerospace Engineering 2018 (December 9, 2018): 1–10. http://dx.doi.org/10.1155/2018/7490895.
Full textBagali, Sheetal, and R. Sundaraguru. "Maximize resource utilization based channel access model with presence of reactive jammer for underwater wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 3284. http://dx.doi.org/10.11591/ijece.v10i3.pp3284-3294.
Full textLee, Hoon, Subin Eom, Junhee Park, and Inkyu Lee. "UAV-Aided Secure Communications With Cooperative Jamming." IEEE Transactions on Vehicular Technology 67, no. 10 (October 2018): 9385–92. http://dx.doi.org/10.1109/tvt.2018.2853723.
Full textLi, An, and Nong Qu. "Secure Performance of an Untrusted AF Relay System with a Friendly Wireless Powered Jammer." Mobile Information Systems 2019 (January 2, 2019): 1–8. http://dx.doi.org/10.1155/2019/6968730.
Full textStojanovski, Toni Draganov, and Ninoslav Marina. "Secure Wireless Communications via Cooperative Transmitting." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/760175.
Full textTANG, Ling, Hao CHEN, and Jianhui WU. "Wireless Secure Communications via Cooperative Relaying and Jamming." IEICE Transactions on Communications E95.B, no. 9 (2012): 2774–84. http://dx.doi.org/10.1587/transcom.e95.b.2774.
Full textZhu, Min, Jianlin Mo, Naixue Xiong, and Jin Wang. "Legitimate Monitoring via Cooperative Relay and Proactive Jamming." IEEE Access 7 (2019): 40133–43. http://dx.doi.org/10.1109/access.2019.2904407.
Full textZhang, Guangchi, Jie Xu, Qingqing Wu, Miao Cui, Xueyi Li, and Fan Lin. "Wireless Powered Cooperative Jamming for Secure OFDM System." IEEE Transactions on Vehicular Technology 67, no. 2 (February 2018): 1331–46. http://dx.doi.org/10.1109/tvt.2017.2756877.
Full textKrikidis, I., J. Thompson, and S. Mclaughlin. "Relay selection for secure cooperative networks with jamming." IEEE Transactions on Wireless Communications 8, no. 10 (October 2009): 5003–11. http://dx.doi.org/10.1109/twc.2009.090323.
Full textChu, Zheng, Huan X. Nguyen, Tuan Anh Le, Mehmet Karamanoglu, Enver Ever, and Adnan Yazici. "Secure Wireless Powered and Cooperative Jamming D2D Communications." IEEE Transactions on Green Communications and Networking 2, no. 1 (March 2018): 1–13. http://dx.doi.org/10.1109/tgcn.2017.2763826.
Full textAlotaibi, Esa R., and Khairi A. Hamdi. "Optimal Cooperative Relaying and Jamming for Secure Communication." IEEE Wireless Communications Letters 4, no. 6 (December 2015): 689–92. http://dx.doi.org/10.1109/lwc.2015.2483496.
Full textGao, Zhi, Hao Sun, Fei Li, Sai Guo, Jianming Wang, Lei Fang, and Chaohui Zhao. "Cooperative Jamming of Multi UAVs to Netted Radar." Journal of Physics: Conference Series 1865, no. 2 (April 1, 2021): 022059. http://dx.doi.org/10.1088/1742-6596/1865/2/022059.
Full textWang, Zijie, Rongke Liu, Qirui Liu, Lincong Han, and Weiqing Mu. "Controllable Positioning Service With UAV-Enabled Cooperative Jamming." IEEE Wireless Communications Letters 10, no. 9 (September 2021): 1929–33. http://dx.doi.org/10.1109/lwc.2021.3086524.
Full textPark, Ki-Hong, Tian Wang, and Mohamed-Slim Alouini. "On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming." IEEE Journal on Selected Areas in Communications 31, no. 9 (September 2013): 1741–50. http://dx.doi.org/10.1109/jsac.2013.130908.
Full textWang, Dawei, Pinyi Ren, Qinghe Du, Li Sun, and Yichen Wang. "Downlink and Uplink Cooperative Transmission for Primary Secrecy Based Cognitive Radio Sensor Networks." International Journal of Distributed Sensor Networks 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/152851.
Full textLi, Zhen, Tao Jing, Yan Huo, and Jin Qian. "Achieving secure communications in multi-antenna cooperative cognitive radio networks using cooperative jamming." International Journal of Sensor Networks 22, no. 2 (2016): 100. http://dx.doi.org/10.1504/ijsnet.2016.079598.
Full textDuy, Tran, Le Khan, Nguyen Binh, and Nguyen Nhat. "Intercept Probability Analysis of Cooperative Cognitive Networks Using Fountain Codes and Cooperative Jamming." EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 8, no. 26 (April 13, 2021): 168229. http://dx.doi.org/10.4108/eai.26-1-2021.168229.
Full textSun, Hanming, Bin Duo, Zhengqiang Wang, Xiaochen Lin, and Changchun Gao. "Aerial Cooperative Jamming for Cellular-Enabled UAV Secure Communication Network: Joint Trajectory and Power Control Design." Sensors 19, no. 20 (October 14, 2019): 4440. http://dx.doi.org/10.3390/s19204440.
Full textHuo, Yan, Yuqi Tian, Chunqiang Hu, Qinghe Gao, and Tao Jing. "A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers." Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/1832051.
Full textHuang, Jing, and A. Lee Swindlehurst. "Cooperative Jamming for Secure Communications in MIMO Relay Networks." IEEE Transactions on Signal Processing 59, no. 10 (October 2011): 4871–84. http://dx.doi.org/10.1109/tsp.2011.2161295.
Full textHajimomeni, Mona, Kwihoon Kim, Hassan Aghaeinia, and Il-Min Kim. "Cooperative jamming polar codes for multiple-access wiretap channels." IET Communications 10, no. 4 (March 3, 2016): 407–15. http://dx.doi.org/10.1049/iet-com.2015.0624.
Full textLiu, Yupeng, Jiangyuan Li, and Athina P. Petropulu. "Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security." IEEE Transactions on Information Forensics and Security 8, no. 4 (April 2013): 682–94. http://dx.doi.org/10.1109/tifs.2013.2248730.
Full textTang, Ling, Hao Chen, and Qianmu Li. "Social Tie Based Cooperative Jamming for Physical Layer Security." IEEE Communications Letters 19, no. 10 (October 2015): 1790–93. http://dx.doi.org/10.1109/lcomm.2015.2462826.
Full textCao, Kuo, Yueming Cai, Yongpeng Wu, and Weiwei Yang. "Cooperative Jamming for Secure Communication With Finite Alphabet Inputs." IEEE Communications Letters 21, no. 9 (September 2017): 2025–28. http://dx.doi.org/10.1109/lcomm.2017.2716974.
Full textZhong, Canhui, Jianping Yao, and Jie Xu. "Secure UAV Communication With Cooperative Jamming and Trajectory Control." IEEE Communications Letters 23, no. 2 (February 2019): 286–89. http://dx.doi.org/10.1109/lcomm.2018.2889062.
Full textMiao, Jiansong, and Ziyuan Zheng. "Cooperative Jamming for Secure UAV-Enabled Mobile Relay System." IEEE Access 8 (2020): 48943–57. http://dx.doi.org/10.1109/access.2020.2980242.
Full textMoon, Jihwan, Hoon Lee, Changick Song, Sunho Lee, and Inkyu Lee. "Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming." IEEE Transactions on Wireless Communications 17, no. 10 (October 2018): 6707–19. http://dx.doi.org/10.1109/twc.2018.2863287.
Full textMoon, Jihwan, Hoon Lee, Changick Song, Seowoo Kang, and Inkyu Lee. "Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing." IEEE Transactions on Wireless Communications 17, no. 10 (October 2018): 6958–71. http://dx.doi.org/10.1109/twc.2018.2865305.
Full textYang, Jun, Il-Min Kim, and Dong In Kim. "Power-Constrained Optimal Cooperative Jamming for Multiuser Broadcast Channel." IEEE Wireless Communications Letters 2, no. 4 (August 2013): 411–14. http://dx.doi.org/10.1109/wcl.2013.050613.130216.
Full textGuo, Wenbo, Hongzhi Zhao, and Youxi Tang. "Testbed for Cooperative Jamming Cancellation in Physical Layer Security." IEEE Wireless Communications Letters 9, no. 2 (February 2020): 240–43. http://dx.doi.org/10.1109/lwc.2019.2950303.
Full textLi, Yupeng, Rongqing Zhang, Jianhua Zhang, and Liuqing Yang. "Cooperative Jamming via Spectrum Sharing for Secure UAV Communications." IEEE Wireless Communications Letters 9, no. 3 (March 2020): 326–30. http://dx.doi.org/10.1109/lwc.2019.2953725.
Full textAnjos, Gustavo, Daniel Castanheira, Adão Silva, and Atílio Gameiro. "A Cooperative Jamming Technique to Protect a Two-User Broadcast Channel with Confidential Messages and an External Eavesdropper." Electronics 9, no. 3 (March 18, 2020): 496. http://dx.doi.org/10.3390/electronics9030496.
Full textBanawan, Karim, and Sennur Ulukus. "Secure Degrees of Freedom in Networks with User Misbehavior." Entropy 21, no. 10 (September 26, 2019): 945. http://dx.doi.org/10.3390/e21100945.
Full textLei, Weijia, Ziwei Wang, and Hongjiang Lei. "Online joint power control for cooperative jamming systems with energy harvesting." International Journal of Distributed Sensor Networks 15, no. 11 (November 2019): 155014771988811. http://dx.doi.org/10.1177/1550147719888118.
Full textLi, Hai Long, Xia Ye, and Shi Qiang Jiang. "Method Resource of Electro-Optical Countermeasures and its Cooperation." Advanced Materials Research 462 (February 2012): 652–57. http://dx.doi.org/10.4028/www.scientific.net/amr.462.652.
Full textLi, Zhen, Tao Jing, Liran Ma, Yan Huo, and Jin Qian. "Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks." Sensors 16, no. 3 (March 7, 2016): 339. http://dx.doi.org/10.3390/s16030339.
Full textGao, Qinghe, Yan Huo, Tao Jing, Liran Ma, Yingkun Wen, and Xiaoshuang Xing. "An Intermittent Cooperative Jamming Strategy for Securing Energy-Constrained Networks." IEEE Transactions on Communications 67, no. 11 (November 2019): 7715–26. http://dx.doi.org/10.1109/tcomm.2019.2937303.
Full textGu, Pengwenlong, Cunqing Hua, Rida Khatoun, Yue Wu, and Ahmed Serhrouchni. "Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks." IEEE Transactions on Vehicular Technology 67, no. 8 (August 2018): 7033–46. http://dx.doi.org/10.1109/tvt.2018.2825600.
Full textHan, Biao, Jie Li, Jinshu Su, Minyi Guo, and Baokang Zhao. "Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs." IEEE Transactions on Parallel and Distributed Systems 26, no. 4 (April 1, 2015): 1117–28. http://dx.doi.org/10.1109/tpds.2014.2316155.
Full textZheng, Gan, Li-Chia Choo, and Kai-Kit Wong. "Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays." IEEE Transactions on Signal Processing 59, no. 3 (March 2011): 1317–22. http://dx.doi.org/10.1109/tsp.2010.2092774.
Full textEl Shafie, Ahmed, Asma Mabrouk, Kamel Tourki, Naofal Al-Dhahir, and Ridha Hamila. "Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals." IEEE Access 5 (2017): 24353–67. http://dx.doi.org/10.1109/access.2017.2768508.
Full textXing, Hong, Kai-Kit Wong, Arumugam Nallanathan, and Rui Zhang. "Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks." IEEE Transactions on Wireless Communications 15, no. 12 (December 2016): 7971–84. http://dx.doi.org/10.1109/twc.2016.2610418.
Full textChen, Guang, Ziyue Tang, and Chang Zhou. "Modeling and Simulation of Three Distributed Cooperative Suppressive Jamming Modes." Journal of Physics: Conference Series 1302 (August 2019): 042022. http://dx.doi.org/10.1088/1742-6596/1302/4/042022.
Full textDing, Zhiguo, Kin K. Leung, Dennis L. Goeckel, and Don Towsley. "Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting." IEEE Transactions on Wireless Communications 10, no. 6 (June 2011): 1725–29. http://dx.doi.org/10.1109/twc.2011.040511.101694.
Full textDehghan, Mostafa, Dennis L. Goeckel, Majid Ghaderi, and Zhiguo Ding. "Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks." IEEE Transactions on Wireless Communications 11, no. 9 (September 2012): 3025–29. http://dx.doi.org/10.1109/twc.2012.070912.110789.
Full text