Skip to main content

Showing 1–3 of 3 results for author: Garcia-Palacios, E

Searching in archive eess. Search in all archives.
.
  1. arXiv:2103.05717  [pdf, other

    eess.SP

    Secrecy Outage Probability of Cognitive Small-Cell Network with Unreliable Backhaul Connections

    Authors: **ghua Zhang, Chinmoy Kundu, Emi Garcia-Palacios

    Abstract: In this paper, we investigate the secrecy performance of underlay cognitive small-cell radio network with unreliable backhaul connections. The secondary cognitive small-cell transmitters are connected to macro base station by wireless backhaul links. The small-cell network is sharing the same spectrum with the primary network ensuring that a desired outage probability constraint in the primary net… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

  2. arXiv:2103.04479  [pdf, ps, other

    eess.SP

    Secrecy Performance of Small-Cell Networks with Transmitter Selection and Unreliable Backhaul under Spectrum Sharing Environment

    Authors: **ghua Zhang, Chinmoy Kundu, Octavia A. Dobre, Emi Garcia-Palacios, Nguyen-Son Vo

    Abstract: We investigate the secrecy performance of an underlay small-cell cognitive radio network under unreliable backhaul connections. The small-cell network shares the same spectrum with the primary network, ensuring that a desired outage probability constraint is always met in the primary network. {To improve the security of the small-cell cognitive network, we propose three sub-optimal small-cell tran… ▽ More

    Submitted 7 March, 2021; originally announced March 2021.

  3. arXiv:2003.01048   

    eess.SP

    Physical Layer Security: Detection of Active Eavesdrop** Attacks by Support Vector Machines

    Authors: Tiep M. Hoang, Trung Q. Duong, Hoang Duong Tuan, Sangarapillai Lambotharan, Emi Garcia-Palacios, Long D. Nguyen

    Abstract: This paper presents a framework for converting wireless signals into structured datasets, which can be fed into machine learning algorithms for the detection of active eavesdrop** attacks at the physical layer. More specifically, a wireless communication system, which consists of K legal users, one access point (AP) and one active eavesdropper, is considered. To cope with the eavesdropper who br… ▽ More

    Submitted 23 February, 2021; v1 submitted 2 March, 2020; originally announced March 2020.

    Comments: All versions on this site are withdrawn because of their serious mistakes. Moreover, the contributions of the co-authors were not considered carefully. Two co-authors have little contributions, which cannot constitute any main contribution. It was a mistake when the first author forgot to update the actual authors, and he hurried to upload the incomplete and flaw files