Wireless Surveillance With Interference Exploitation in Unauthorized Underlaid D2D Networks.
Yingdong HuShibing ZhangJue WangYe LiLili GuoPublished in: IEEE Access (2020)
Keyphrases
- cellular networks
- wireless networks
- access points
- network connectivity
- wireless communication
- access network
- complex networks
- call admission control
- mobile devices
- mobile wireless
- network structure
- surveillance system
- mobile ad hoc networks
- mobile nodes
- channel assignment
- health monitoring
- wireless technologies
- multimedia content
- pose estimation
- real time
- wireless mesh networks
- network infrastructure
- network design
- secret information
- image registration
- wireless sensor networks
- wired networks
- wireless local area networks