Cited 10 time in
Deep-Learning-Assisted Wireless-Powered Secure Communications With Imperfect Channel State Information
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lee, Woongsup | - |
| dc.contributor.author | Lee, Kisong | - |
| dc.contributor.author | Quek, Tony Q. S. | - |
| dc.date.accessioned | 2022-12-26T06:40:27Z | - |
| dc.date.available | 2022-12-26T06:40:27Z | - |
| dc.date.issued | 2022-07 | - |
| dc.identifier.issn | 2372-2541 | - |
| dc.identifier.issn | 2327-4662 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/1065 | - |
| dc.description.abstract | In this article, we consider a practical scenario for secure wireless-powered communication in the presence of imperfect channel state information (CSI) with simultaneous energy harvesting, in which it is required to keep information secret from an untrusted energy receiver allowed only to harvest energy from the transmitted signals. We aim to find the robust transmit power control (TPC) strategy to maximize the secrecy rate whilst ensuring the spectral efficiency of transceiver pairs and the amount of energy harvested by the energy receiver, even when the CSI is inaccurate. To deal with the nonconvexity of the formulated optimization problem, we first derive a suboptimal form of TPC in an iterative manner by adopting dual methods. In order to overcome the drawbacks of the conventional optimization-based approach regarding the suboptimality of performance and requiring long computation time, we devise a deep learning (DL)-assisted TPC as an alternative means of deriving the TPC. In the considered DL-assisted TPC, a deep neural network (DNN) is trained to compensate for the distortion caused by channel errors in an unsupervised manner. More specifically, artificially distorted CSI, which reflects the difference between actual and estimated CSI, is fed into the DNN during training and used to update the weights and biases of the proposed DNN using a bounded loss function, which allows a robust TPC strategy to be approximated by the DNN. Simulation results reveal the robustness of the proposed DL-assisted TPC against channel errors, such that it achieves a near-optimal performance with a lower computation time, even when the CSI is incorrect. | - |
| dc.format.extent | 13 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
| dc.title | Deep-Learning-Assisted Wireless-Powered Secure Communications With Imperfect Channel State Information | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/JIOT.2021.3128936 | - |
| dc.identifier.scopusid | 2-s2.0-85120087790 | - |
| dc.identifier.wosid | 000812536000089 | - |
| dc.identifier.bibliographicCitation | IEEE Internet of Things Journal, v.9, no.13, pp 11464 - 11476 | - |
| dc.citation.title | IEEE Internet of Things Journal | - |
| dc.citation.volume | 9 | - |
| dc.citation.number | 13 | - |
| dc.citation.startPage | 11464 | - |
| dc.citation.endPage | 11476 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordPlus | PHYSICAL-LAYER SECURITY | - |
| dc.subject.keywordPlus | RESOURCE-ALLOCATION | - |
| dc.subject.keywordPlus | NETWORKS | - |
| dc.subject.keywordPlus | OPTIMIZATION | - |
| dc.subject.keywordPlus | SWIPT | - |
| dc.subject.keywordPlus | COMPLEXITY | - |
| dc.subject.keywordPlus | SELECTION | - |
| dc.subject.keywordPlus | INTERNET | - |
| dc.subject.keywordPlus | DESCENT | - |
| dc.subject.keywordPlus | NOMA | - |
| dc.subject.keywordAuthor | Internet of Things | - |
| dc.subject.keywordAuthor | Optimization | - |
| dc.subject.keywordAuthor | Resource management | - |
| dc.subject.keywordAuthor | Iterative methods | - |
| dc.subject.keywordAuthor | Deep learning | - |
| dc.subject.keywordAuthor | Training | - |
| dc.subject.keywordAuthor | Receivers | - |
| dc.subject.keywordAuthor | Channel error | - |
| dc.subject.keywordAuthor | deep learning (DL) | - |
| dc.subject.keywordAuthor | energy harvesting (EH) | - |
| dc.subject.keywordAuthor | nonconvex optimization | - |
| dc.subject.keywordAuthor | secure communication | - |
| dc.subject.keywordAuthor | transmit power control (TPC) | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
