Search Results - "Yeoh, Phee Lep"
-
1
Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels
Published in IEEE transactions on communications (01-01-2013)“…We propose and analyze transmit antenna selection (TAS) to enhance physical layer security in a wiretap channel with N A antennas at the transmitter, N B…”
Get full text
Journal Article -
2
Multiuser MIMO Relay Networks in Nakagami-m Fading Channels
Published in IEEE transactions on communications (01-11-2012)“…This paper proposes a low complexity protocol that preserves full diversity in multiuser amplify-and-forward relay networks with N S antennas at the source, N…”
Get full text
Journal Article -
3
Two-Way Relaying With Multi-Antenna Sources: Beamforming and Antenna Selection
Published in IEEE transactions on vehicular technology (01-11-2012)“…We propose and analyze two multiple-input-multiple-output (MIMO) two-way relaying schemes with an amplify-and-forward protocol in Nakagami- m fading channels,…”
Get full text
Journal Article -
4
Secure Communications for UAV-Enabled Mobile Edge Computing Systems
Published in IEEE transactions on communications (01-01-2020)“…In this paper, we propose a secure unmanned aerial vehicle (UAV) mobile edge computing (MEC) system where multiple ground users offload large computing tasks…”
Get full text
Journal Article -
5
Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens
Published in IEEE transactions on communications (01-06-2020)“…In this paper, we address the problem of joint covert communication and secure transmission in untrusted relaying networks when multiple wardens exist in the…”
Get full text
Journal Article -
6
Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer
Published in IEEE transactions on communications (01-06-2018)“…In this paper, we examine the secrecy performance of two-way relaying between a large-scale multiple antenna base station (BS) and a single antenna mobile user…”
Get full text
Journal Article -
7
Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location
Published in IEEE transactions on vehicular technology (01-11-2018)“…In this correspondence paper, we consider an unmanned aerial vehicle (UAV) equipped with an air-to-ground friendly jammer assisting secure communications…”
Get full text
Journal Article -
8
MIMO Relaying: Distributed TAS/MRC in Nakagami-m Fading
Published in IEEE transactions on communications (01-10-2011)“…We develop a unified framework for the symbol error rate (SER) of distributed transmit antenna selection with receiver maximal-ratio combining (TAS/MRC) in…”
Get full text
Journal Article -
9
Secret Key Generation for Intelligent Reflecting Surface Assisted Wireless Communication Networks
Published in IEEE transactions on vehicular technology (01-01-2021)“…We propose and analyze secret key generation using intelligent reflecting surface (IRS) assisted wireless communication networks. To this end, we first…”
Get full text
Journal Article -
10
LayerChain: A Hierarchical Edge-Cloud Blockchain for Large-Scale Low-Delay Industrial Internet of Things Applications
Published in IEEE transactions on industrial informatics (01-07-2021)“…The combination of pervasive edge computing and blockchain technologies opens up significant possibilities for industrial Internet of Things (IIoT)…”
Get full text
Journal Article -
11
Communication-and-Computing Latency Minimization for UAV-Enabled Virtual Reality Delivery Systems
Published in IEEE transactions on communications (01-03-2021)“…In this paper, we propose a low-latency virtual reality (VR) delivery system where an unmanned aerial vehicle (UAV) base station (U-BS) is deployed to deliver…”
Get full text
Journal Article -
12
Distributed Multi-Agent Target Tracking: A Nash-Combined Adaptive Differential Evolution Method for UAV Systems
Published in IEEE transactions on vehicular technology (01-08-2021)“…Multi-agent cooperative target tracking plays a significant role in distributed artificial intelligence for unmanned aerial vehicle (UAV) systems. Most…”
Get full text
Journal Article -
13
Secure Deep Reinforcement Learning for Dynamic Resource Allocation in Wireless MEC Networks
Published in IEEE transactions on communications (01-03-2024)“…This paper proposes a blockchain-secured deep reinforcement learning (BC-DRL) optimization framework for data management and resource allocation in…”
Get full text
Journal Article -
14
MapChain-D: A Distributed Blockchain for IIoT Data Storage and Communications
Published in IEEE transactions on industrial informatics (01-09-2023)“…With the rapid growth of Industrial Internet of Things (IIoT) devices, managing an extensive volume of IIoT data becomes a significant challenge. While the…”
Get full text
Journal Article -
15
Dependent Task Scheduling and Offloading for Minimizing Deadline Violation Ratio in Mobile Edge Computing Networks
Published in IEEE journal on selected areas in communications (01-02-2023)“…This paper considers computation offloading for mobile applications with task-dependency requirements in mobile edge computing (MEC) systems. Based on the…”
Get full text
Journal Article -
16
On the Exact and Asymptotic SER of Receive Diversity With Multiple Amplify-and-Forward Relays
Published in IEEE transactions on vehicular technology (01-11-2010)“…Receive diversity with multiple amplify-and-forward (AF) relays is analyzed over unbalanced hops with independent but not necessarily identically distributed…”
Get full text
Journal Article -
17
Secure Multi-Layer MEC Systems With UAV-Enabled Reconfigurable Intelligent Surface Against Full-Duplex Eavesdropper
Published in IEEE transactions on communications (01-03-2024)“…In this paper, we develop a secure multi-layer mobile edge computing (MEC) system where an unmanned aerial vehicle (UAV) equipped with a reconfigurable…”
Get full text
Journal Article -
18
Weighted Sum Age of Information Minimization in Wireless Networks with Aerial IRS
Published in IEEE transactions on vehicular technology (01-04-2023)“…In this letter, we analyze a terrestrial wireless communication network assisted by an aerial intelligent reflecting surface (AIRS). We consider a packet…”
Get full text
Journal Article -
19
Caching and UAV Friendly Jamming for Secure Communications With Active Eavesdropping Attacks
Published in IEEE transactions on vehicular technology (01-10-2022)“…In this paper, we discuss the security and reliability performance of a communication system, where the base station (BS) transmits signals to multiple users…”
Get full text
Journal Article -
20
Physical Layer Key Generation for Secure OAM Communication Systems
Published in IEEE transactions on vehicular technology (01-11-2022)“…In this paper, we propose a physical layer secret key (PLSK) generation scheme for secure encrypted transmissions in orbital angular momentum (OAM)…”
Get full text
Journal Article