Search Results - "Yeoh, Phee Lep"

Refine Results
  1. 1

    Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels by Nan Yang, Yeoh, P. L., Elkashlan, M., Schober, R., Collings, I. B.

    Published in IEEE transactions on communications (01-01-2013)
    “…We propose and analyze transmit antenna selection (TAS) to enhance physical layer security in a wiretap channel with N A antennas at the transmitter, N B…”
    Get full text
    Journal Article
  2. 2

    Multiuser MIMO Relay Networks in Nakagami-m Fading Channels by Nan Yang, Elkashlan, M., Phee Lep Yeoh, Jinhong Yuan

    Published in IEEE transactions on communications (01-11-2012)
    “…This paper proposes a low complexity protocol that preserves full diversity in multiuser amplify-and-forward relay networks with N S antennas at the source, N…”
    Get full text
    Journal Article
  3. 3

    Two-Way Relaying With Multi-Antenna Sources: Beamforming and Antenna Selection by Nan Yang, Phee Lep Yeoh, Elkashlan, M., Collings, I. B., Zhuo Chen

    Published in IEEE transactions on vehicular technology (01-11-2012)
    “…We propose and analyze two multiple-input-multiple-output (MIMO) two-way relaying schemes with an amplify-and-forward protocol in Nakagami- m fading channels,…”
    Get full text
    Journal Article
  4. 4

    Secure Communications for UAV-Enabled Mobile Edge Computing Systems by Zhou, Yi, Pan, Cunhua, Yeoh, Phee Lep, Wang, Kezhi, Elkashlan, Maged, Vucetic, Branka, Li, Yonghui

    Published in IEEE transactions on communications (01-01-2020)
    “…In this paper, we propose a secure unmanned aerial vehicle (UAV) mobile edge computing (MEC) system where multiple ground users offload large computing tasks…”
    Get full text
    Journal Article
  5. 5

    Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens by Forouzesh, Moslem, Azmi, Paeiz, Kuhestani, Ali, Yeoh, Phee Lep

    Published in IEEE transactions on communications (01-06-2020)
    “…In this paper, we address the problem of joint covert communication and secure transmission in untrusted relaying networks when multiple wardens exist in the…”
    Get full text
    Journal Article
  6. 6

    Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks With an External Jammer by Kuhestani, Ali, Mohammadi, Abbas, Yeoh, Phee Lep

    Published in IEEE transactions on communications (01-06-2018)
    “…In this paper, we examine the secrecy performance of two-way relaying between a large-scale multiple antenna base station (BS) and a single antenna mobile user…”
    Get full text
    Journal Article
  7. 7

    Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location by Zhou, Yi, Yeoh, Phee Lep, Chen, He, Li, Yonghui, Schober, Robert, Zhuo, Li, Vucetic, Branka

    Published in IEEE transactions on vehicular technology (01-11-2018)
    “…In this correspondence paper, we consider an unmanned aerial vehicle (UAV) equipped with an air-to-ground friendly jammer assisting secure communications…”
    Get full text
    Journal Article
  8. 8

    MIMO Relaying: Distributed TAS/MRC in Nakagami-m Fading by Phee Lep Yeoh, Elkashlan, M., Collings, I. B.

    Published in IEEE transactions on communications (01-10-2011)
    “…We develop a unified framework for the symbol error rate (SER) of distributed transmit antenna selection with receiver maximal-ratio combining (TAS/MRC) in…”
    Get full text
    Journal Article
  9. 9

    Secret Key Generation for Intelligent Reflecting Surface Assisted Wireless Communication Networks by Ji, Zijie, Yeoh, Phee Lep, Zhang, Deyou, Chen, Gaojie, Zhang, Yan, He, Zunwen, Yin, Hao, li, Yonghui

    Published in IEEE transactions on vehicular technology (01-01-2021)
    “…We propose and analyze secret key generation using intelligent reflecting surface (IRS) assisted wireless communication networks. To this end, we first…”
    Get full text
    Journal Article
  10. 10

    LayerChain: A Hierarchical Edge-Cloud Blockchain for Large-Scale Low-Delay Industrial Internet of Things Applications by Yu, Yao, Liu, Shumei, Yeoh, Phee Lep, Vucetic, Branka, Li, Yonghui

    “…The combination of pervasive edge computing and blockchain technologies opens up significant possibilities for industrial Internet of Things (IIoT)…”
    Get full text
    Journal Article
  11. 11

    Communication-and-Computing Latency Minimization for UAV-Enabled Virtual Reality Delivery Systems by Zhou, Yi, Pan, Cunhua, Yeoh, Phee Lep, Wang, Kezhi, Elkashlan, Maged, Vucetic, Branka, Li, Yonghui

    Published in IEEE transactions on communications (01-03-2021)
    “…In this paper, we propose a low-latency virtual reality (VR) delivery system where an unmanned aerial vehicle (UAV) base station (U-BS) is deployed to deliver…”
    Get full text
    Journal Article
  12. 12

    Distributed Multi-Agent Target Tracking: A Nash-Combined Adaptive Differential Evolution Method for UAV Systems by Yu, Yao, Wang, Hongli, Liu, Shumei, Guo, Lei, Yeoh, Phee Lep, Vucetic, Branka, Li, Yonghui

    Published in IEEE transactions on vehicular technology (01-08-2021)
    “…Multi-agent cooperative target tracking plays a significant role in distributed artificial intelligence for unmanned aerial vehicle (UAV) systems. Most…”
    Get full text
    Journal Article
  13. 13

    Secure Deep Reinforcement Learning for Dynamic Resource Allocation in Wireless MEC Networks by Hao, Xin, Yeoh, Phee Lep, She, Changyang, Vucetic, Branka, Li, Yonghui

    Published in IEEE transactions on communications (01-03-2024)
    “…This paper proposes a blockchain-secured deep reinforcement learning (BC-DRL) optimization framework for data management and resource allocation in…”
    Get full text
    Journal Article
  14. 14

    MapChain-D: A Distributed Blockchain for IIoT Data Storage and Communications by Wu, Tiantong, Jourjon, Guillaume, Thilakarathna, Kanchana, Yeoh, Phee Lep

    “…With the rapid growth of Industrial Internet of Things (IIoT) devices, managing an extensive volume of IIoT data becomes a significant challenge. While the…”
    Get full text
    Journal Article
  15. 15

    Dependent Task Scheduling and Offloading for Minimizing Deadline Violation Ratio in Mobile Edge Computing Networks by Liu, Shumei, Yu, Yao, Lian, Xiao, Feng, Yuze, She, Changyang, Yeoh, Phee Lep, Guo, Lei, Vucetic, Branka, Li, Yonghui

    “…This paper considers computation offloading for mobile applications with task-dependency requirements in mobile edge computing (MEC) systems. Based on the…”
    Get full text
    Journal Article
  16. 16

    On the Exact and Asymptotic SER of Receive Diversity With Multiple Amplify-and-Forward Relays by Elkashlan, Maged, Phee Lep Yeoh, Louie, Raymond H Y, Collings, Iain B

    Published in IEEE transactions on vehicular technology (01-11-2010)
    “…Receive diversity with multiple amplify-and-forward (AF) relays is analyzed over unbalanced hops with independent but not necessarily identically distributed…”
    Get full text
    Journal Article
  17. 17

    Secure Multi-Layer MEC Systems With UAV-Enabled Reconfigurable Intelligent Surface Against Full-Duplex Eavesdropper by Zhou, Yi, Ma, Zheng, Liu, Gang, Zhang, Zhengquan, Yeoh, Phee Lep, Vucetic, Branka, Li, Yonghui

    Published in IEEE transactions on communications (01-03-2024)
    “…In this paper, we develop a secure multi-layer mobile edge computing (MEC) system where an unmanned aerial vehicle (UAV) equipped with a reconfigurable…”
    Get full text
    Journal Article
  18. 18

    Weighted Sum Age of Information Minimization in Wireless Networks with Aerial IRS by Lyu, Wanting, Xiu, Yue, Yang, Songjie, Yeoh, Phee Lep, Li, Yonghui, Zhang, Zhongpei

    Published in IEEE transactions on vehicular technology (01-04-2023)
    “…In this letter, we analyze a terrestrial wireless communication network assisted by an aerial intelligent reflecting surface (AIRS). We consider a packet…”
    Get full text
    Journal Article
  19. 19

    Caching and UAV Friendly Jamming for Secure Communications With Active Eavesdropping Attacks by Zhou, Yi, Yeoh, Phee Lep, Pan, Cunhua, Wang, Kezhi, Ma, Zheng, Vucetic, Branka, Li, Yonghui

    Published in IEEE transactions on vehicular technology (01-10-2022)
    “…In this paper, we discuss the security and reliability performance of a communication system, where the base station (BS) transmits signals to multiple users…”
    Get full text
    Journal Article
  20. 20

    Physical Layer Key Generation for Secure OAM Communication Systems by Zhang, Mengyi, Ji, Zijie, Zhang, Yan, Yeoh, Phee Lep, He, Zunwen, Li, Yonghui

    Published in IEEE transactions on vehicular technology (01-11-2022)
    “…In this paper, we propose a physical layer secret key (PLSK) generation scheme for secure encrypted transmissions in orbital angular momentum (OAM)…”
    Get full text
    Journal Article