Login / Signup

Insecure Region Around Receiver for Downlink Transmissions With Randomly Located Active Eavesdropper.

Tao LiChaozheng XueYongzhao LiOctavia A. Dobre
Published in: IEEE Wirel. Commun. Lett. (2020)
Keyphrases
  • code division multiple access
  • resource allocation
  • neural network
  • input image
  • application layer
  • division multiple access
  • image regions
  • secret key
  • software implementation
  • randomly chosen
  • diffie hellman