We consider a rate-splitting multiple access (RSMA)-based communication ...
We aim to secure a large-scale device-to-device (D2D) network against
ad...
We exploit both covert communication and friendly jamming to propose a
f...
Metaverse has recently attracted much attention from both academia and
i...
Recently, due to the staggering growth of wireless data traffic,
heterog...
With growing security threats to the evolving wireless systems, protecti...
For the sake of protecting data privacy and due to the rapid development...
With the explosive growth of smart IoT devices at the edge of the Intern...
With a sponsored content scheme in a wireless network, a sponsored conte...
Open-access blockchains based on proof-of-work protocols have gained
tre...
The data sponsored scheme allows the content provider to cover parts of ...
As the core issue of blockchain, the mining requires solving a proof-of-...
The mining process in blockchain requires solving a proof-of-work puzzle...