Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
37
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 94 publications
(37 citation statements)
references
References 14 publications
0
37
0
Order By: Relevance
“…A method for increasing secrecy capacity using artificial noise or jamming is disclosed [18,19]. The jamming strategy is to send an artificial noise signal to the eavesdropper to effectively reduce their channel quality from correct reception.…”
Section: Artificial Noise/jammingmentioning
confidence: 99%
“…A method for increasing secrecy capacity using artificial noise or jamming is disclosed [18,19]. The jamming strategy is to send an artificial noise signal to the eavesdropper to effectively reduce their channel quality from correct reception.…”
Section: Artificial Noise/jammingmentioning
confidence: 99%
“…e emerging mobile communication technology has driven the shift from traditional to mobile and has brought the Internet to every terminal [1,2]. With the rapid development of the mobile Internet, the number of mobile terminals is rapidly increasing, and the communication system has an increasing demand for data transmission rates.…”
Section: Introductionmentioning
confidence: 99%
“…When storing sensitive data like personal health records to cloud servers, the security and privacy of these data are still challenges in the fog computing paradigm [10][11][12]. To solve this problem, applying access control mechanism is an essential method to protect the sensitive data from unauthorized users.…”
Section: Introductionmentioning
confidence: 99%