Login / Signup
Proactive Eavesdropping via Jamming Over Multiple Suspicious Links With Wireless-Powered Monitor.
Guojie Hu
Jiangbo Si
Yunlong Cai
Naofal Al-Dhahir
Published in:
IEEE Signal Process. Lett. (2022)
Keyphrases
</>
real time
wireless communication
wireless networks
multiple objects
database
genetic algorithm
web pages
website
mobile ad hoc networks
multiple types
multi hop