UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Alternative Optimization for Secrecy Throughput Maximization in UAV-Aided NOMA Networks Journal article
Qian Liping, Zhang Wenjie, Wang Qian, Wu Yuan, Yang Xiaoniu. Alternative Optimization for Secrecy Throughput Maximization in UAV-Aided NOMA Networks[J]. IEEE Wireless Communications Letters, 2022, 11(12), 2580-2584.
Authors:  Qian Liping;  Zhang Wenjie;  Wang Qian;  Wu Yuan;  Yang Xiaoniu
Favorite | TC[WOS]:7 TC[Scopus]:8  IF:4.6/4.9 | Submit date:2023/01/30
Secrecy Throughput Maximization  Non-orthogonal Multiple Access  Successive Convex Approximation  Cross-entropy  
Secrecy driven Federated Learning via Cooperative Jamming: An Approach of Latency Minimization Journal article
Wang Tianshun, Li Yang, Wu Yuan, Quek Tony Q.S.. Secrecy driven Federated Learning via Cooperative Jamming: An Approach of Latency Minimization[J]. IEEE Transactions on Emerging Topics in Computing, 2022, 10(4), 1687 - 1703.
Authors:  Wang Tianshun;  Li Yang;  Wu Yuan;  Quek Tony Q.S.
Favorite | TC[WOS]:22 TC[Scopus]:29  IF:5.1/4.5 | Submit date:2022/05/17
Federated Learning  Physical Layer Security  Secrecy Throughput  Cooperative Jamming  Nonorthogonal Multiple Access