Search citation statements

Order By: Relevance
Select...
2
1
1
0
30
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

0
30
0
Order By: Relevance
“…This metric determines the average number of bits of confidential information received per unit time. We assume that the secrecy capacity is C s , and a ratio of the transmission duration to the total timeslot is ð1 − αÞ; then, the secrecy throughput is calculated as follows [29]:…”
Section: Secrecy Gap (Sg)mentioning
Create an account to read the remaining citation statements from this report. You will also get access to:
  • Search over 1.2b+ citation statments to see what is being said about any topic in the research literature
  • Advanced Search to find publications that support or contrast your research
  • Citation reports and visualizations to easily see what publications are saying about each other
  • Browser extension to see Smart Citations wherever you read research
  • Dashboards to evaluate and keep track of groups of publications
  • Alerts to stay on top of citations as they happen
  • Automated reference checks to make sure you are citing reliable research in your manuscripts
  • 14 day free preview of our premium features.

Trusted by researchers and organizations around the world

Over 130,000 students researchers, and industry experts at use scite

See what students are saying

rupbmjkragerfmgwileyiopcupepmcmbcthiemesagefrontiersapsiucrarxivemeralduhksmucshluniversity-of-gavle
“…This metric determines the average number of bits of confidential information received per unit time. We assume that the secrecy capacity is C s , and a ratio of the transmission duration to the total timeslot is ð1 − αÞ; then, the secrecy throughput is calculated as follows [29]:…”
Section: Secrecy Gap (Sg)mentioning
“…where p 1 = c 1 − c2 c3 and p 2 = c 3 ; c 1 , c 2 , and c 3 are constants related to the detailed circuit specifications such as the resistance, capacitance, and diode turn-on voltage [35], [37]. Ei (x) = and broadcasts it after amplification.…”
Section: System Model a Channel And Signal Modelsmentioning
“…Besides, considering that the suspicious nodes with long working hours and multiple tasks may be energyconstrained devices under certain circumstances such as realtime tracking, a dedicated power beacon is thus introduced to ensure the power supply of the suspicious system [7]. At present, two types of energy harvesting (EH) models were proposed in existing studies: i) the linear model assuming constant power conversion efficiency [31]- [33], and ii) the nonlinear model in which the amount of harvested energy increases nonlinearly with the input power [34]- [37]. The former is a simple and tractable model that can provide an excellent approximation to the linear region of the actual energy harvester.…”
Section: Introductionmentioning
See 1 more Smart Citation
“…Two-hop cooperative communication with the destination transmitting the jamming signal was considered, and both adaptive time conversion and power cutting schemes were presented in [19], where the maximum secrecy capacity and its relationship with the time conversion ratio and power cutting rate are studied. A SWIPT-enabled system by full-duplex (FD) jamming at the intended receiver is proposed to enhance secrecy performance and the secrecy throughput of the system is analyzed in [20]. e FD destination node with the ability of emitting artificial noise is exploited to achieve better secrecy transmission in the threenode eavesdropping scenario of SWIPT, where the destination employed time-switching (TS) protocol to harvest energy, and the closed-form expressions of the connection outage probability (COP), the secrecy outage probability (SOP), the transmission outage probability (TOP), and the secrecy energy efficiency are derived [21].…”
Section: Introductionmentioning