Login / Signup
Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications.
Guojie Hu
Fengchao Zhu
Jiangbo Si
Yunlong Cai
Naofal Al-Dhahir
Published in:
IEEE Signal Process. Lett. (2022)
Keyphrases
</>
power allocation
resource allocation
communication systems
wireless sensor networks
image quality
computer simulation