Abstract: The conventional physical-layer (PHY) security approaches, e.g., transmit beamforming and artificial noise (AN)-based design, may fail when the channels of legitimate user (LU) and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results