Login / Signup

Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications.

Guojie HuFengchao ZhuJiangbo SiYunlong CaiNaofal Al-Dhahir
Published in: IEEE Signal Process. Lett. (2022)
Keyphrases
  • power allocation
  • resource allocation
  • communication systems
  • wireless sensor networks
  • image quality
  • computer simulation