Cited 13 time in
Deep Learning Framework for Secure Communication With an Energy Harvesting Receiver
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lee, Kisong | - |
| dc.contributor.author | Hong, Jun-Pyo | - |
| dc.contributor.author | Lee, Woongsup | - |
| dc.date.accessioned | 2022-12-26T09:46:32Z | - |
| dc.date.available | 2022-12-26T09:46:32Z | - |
| dc.date.issued | 2021-10 | - |
| dc.identifier.issn | 0018-9545 | - |
| dc.identifier.issn | 1939-9359 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/3150 | - |
| dc.description.abstract | In this paper, we consider wireless-powered secure communication with an energy harvesting receiver, which is allowed to harvest energy from the transmitted signals but not to decode information, and there is thus a requirement to keep the information secret from this potential eavesdropper. Considering co-channel interference among signal links, we find the optimal transmit power to maximize the sum rate of the signal links, while ensuring the requirements of information secrecy and energy harvesting. Due to the non-convexity of the optimization problem formulated here, we first derive suboptimal solutions using an iterative algorithm based on a dual method. In order to address the limitations caused by the use of the iterative algorithm, i.e., long computation time and suboptimality, we design an efficient deep neural network (DNN) framework and a novel training strategy as a means of combining supervised and unsupervised training. Specifically, the DNN is first pre-trained using labeled training data with the suboptimal solutions obtained from the iterative algorithm in a supervised manner; further training is then applied to the DNN using a well designed loss function in an unsupervised manner to enhance the training performance. Simulation results reveal that the proposed scheme achieves a near-optimal performance with a lower computation time than existing schemes. We also verify that the pre-training and the new loss function are effective in improving the speed of training of the DNN. | - |
| dc.format.extent | 12 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Institute of Electrical and Electronics Engineers | - |
| dc.title | Deep Learning Framework for Secure Communication With an Energy Harvesting Receiver | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/TVT.2021.3103521 | - |
| dc.identifier.scopusid | 2-s2.0-85117462252 | - |
| dc.identifier.wosid | 000707443200040 | - |
| dc.identifier.bibliographicCitation | IEEE Transactions on Vehicular Technology, v.70, no.10, pp 10121 - 10132 | - |
| dc.citation.title | IEEE Transactions on Vehicular Technology | - |
| dc.citation.volume | 70 | - |
| dc.citation.number | 10 | - |
| dc.citation.startPage | 10121 | - |
| dc.citation.endPage | 10132 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalResearchArea | Transportation | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Transportation Science & Technology | - |
| dc.subject.keywordPlus | TO-DEVICE COMMUNICATION | - |
| dc.subject.keywordPlus | PHYSICAL-LAYER SECURITY | - |
| dc.subject.keywordPlus | WIRELESS INFORMATION | - |
| dc.subject.keywordPlus | RESOURCE-ALLOCATION | - |
| dc.subject.keywordPlus | NEURAL-NETWORKS | - |
| dc.subject.keywordPlus | POWER TRANSFER | - |
| dc.subject.keywordPlus | OPTIMIZATION | - |
| dc.subject.keywordPlus | MANAGEMENT | - |
| dc.subject.keywordPlus | TRANSMISSION | - |
| dc.subject.keywordPlus | COMPLEXITY | - |
| dc.subject.keywordAuthor | Interference | - |
| dc.subject.keywordAuthor | Deep learning | - |
| dc.subject.keywordAuthor | Training | - |
| dc.subject.keywordAuthor | Power control | - |
| dc.subject.keywordAuthor | Iterative methods | - |
| dc.subject.keywordAuthor | Optimization | - |
| dc.subject.keywordAuthor | Security | - |
| dc.subject.keywordAuthor | Secure communication | - |
| dc.subject.keywordAuthor | energy harvesting | - |
| dc.subject.keywordAuthor | deep neural network | - |
| dc.subject.keywordAuthor | pre-training | - |
| dc.subject.keywordAuthor | transmit power control | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
