• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Exploiting Adaptive Jamming in Secure Cooperative NOMA with an Untrusted Relay.

Lu LvHai JiangZhiguo DingLong YangJian Chen
Published in: ICC (2019)
Keyphrases
  • cooperative
  • sensitive data
  • lightweight
  • third party
  • distributed problem solving
  • data sets
  • neural network
  • multi agent
  • key management
  • security protocols