The following publications are possibly variants of this publication:
- Friendly-jamming schemes to secure ultra-reliable and low-latency communications in 5G and beyond communicationsXuran Li, Hong-Ning Dai, Mahendra Kumar Shukla, Dengwang Li, Huaqiang Xu, Muhammad Imran 0001. csi, 78:103540, 2021. [doi]
- UAV-Enabled Secure Communications via Collaborative Beamforming With Imperfect Eavesdropper InformationGeng Sun 0001, Xiaoya Zheng, Zemin Sun, Qingqing Wu, Jiahui Li 0002, Yanheng Liu, Victor C. M. Leung. tmc, 23(4):3291-3308, April 2024. [doi]
- RIS-Assisted Robust Hybrid Beamforming Against Simultaneous Jamming and Eavesdropping AttacksYifu Sun, Kang An 0001, Yonggang Zhu, Gan Zheng, Kai-Kit Wong, Symeon Chatzinotas, Haifan Yin, Pengtao Liu. TWC, 21(11):9212-9231, 2022. [doi]
- RIS-Assisted Secure Transmission Exploiting Statistical CSI of EavesdropperCen Liu, Chang Tian, Peixi Liu. globecom 2021: 1-6 [doi]
- Secure multicast communications with private jammersKanapathippillai Cumanan, Zhiguo Ding, Mai Xu, H. Vincent Poor. spawc 2016: 1-6 [doi]
- Fully secure fuzzy identity-based encryption for secure IoT communicationsYijun Mao, Jin Li 0002, Min-Rong Chen, Jianan Liu, Congge Xie, Yiju Zhan. csi, 44:117-121, 2016. [doi]
- Wireless-Powered Secure Transmission with Full-Duplex Relay and Imperfect Eavesdropper CSIZheng Wang, Jingping Qiao, Anming Dong, Jie Tian 0003, Dianjie Lu. icct 2020: 1121-1126 [doi]