This work considers mitigation of information leakage between communication and sensing operations in joint communication and sensing systems. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to simultaneously ...
In this paper, we investigate secure transmission in active reconfigurable intelligent surface (RIS)-assisted integrated sensing and communication (ISAC) systems. The dual-function base station communicates with the legitimate user and detects the sensing target simultaneously via active RIS, while the co...
In this paper, we consider joint antenna allocation and transmit beamforming design in secure integrated sensing and communication (ISAC) systems. A dual-function base station (DFBS) aims to securely deliver messages to a single-antenna receiver while detecting potential eavesdroppers. To prevent eaves...
The main challenges for FL include communication efficiency, privacy and robustness. In order to reduce the transmission cost of FL, there are currently some attempts to apply compressed sensing (CS) and quantization strategies as well as a combination of both. Insufficiently, they ignore privacy ...
In wireless networking, the security of flying ad hoc networks (FANETs) is a major issue, and the use of drones is growing every day. A distributed network is created by a drone network in which nodes can enter and exit the network at any time. Because m
Under the constraints of transmit power, legitimate communication quality of service, and sensing beam pattern gain, the problem is formulated as a joint optimization of UAV positioning and communication and sensing beamforming, aiming to minimize the maximum eavesdropping SINR. (2) Owing to the ...
dsPIC33C MPT secure DSCs can be used in a variety of digital power, motor control, wireless power, advanced sensing and control, robust capacitive touch and general high-performance embedded applications in automotive, industrial, consumer and medical designs. Learn More Adding Security Is Ea...
Especially in friend-making services, we need to maximize the contact and communication among the users but minimize the privacy disclosure of the users’ information. Our work proposed a secure fine-grained friend-making scheme to achieve secure friend-making. We configured multi-authorization ...
In TMWSNs, the storage nodes are not only responsible for collecting the sensing data from the sensor nodes but also processing the queries from the Sink. Once the storage nodes are captured by the adversaries, all the data stored on the storage nodes are disclosed to the adversaries, data ...
In this paper, we consider a physical layer security (PLS) problem for a hybrid wiretapping wireless system in millimeter-wave transmission, where the active eavesdropper and passive eavesdropper (Eve) may coexist to intercept the confidential messages and emit jamming signals. To achieve secure and...