References of "Chatzinotas, Symeon 50001234"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailRadio Resource Management Techniques for Multibeam Satellite Systems
Kisseleff, Steven UL; Lagunas, Eva UL; Abdu, Tedros Salih UL et al

in IEEE Communications Letters (2021), 25(8), 2448-2452

Next–generation of satellite communication (SatCom) networks are expected to support extremely high data rates for a seamless integration into future large satellite-terrestrial networks. In view of the ... [more ▼]

Next–generation of satellite communication (SatCom) networks are expected to support extremely high data rates for a seamless integration into future large satellite-terrestrial networks. In view of the coming spectral limitations, the main challenge is to reduce the cost (satellite launch and operation) per bit, which can be achieved by enhancing the spectral efficiencies. In addition, the capability to quickly and flexibly assign radio resources according to the traffic demand distribution has become a must for future multibeam broadband satellite systems. This article presents the radio resource management problems encountered in the design of future broadband SatComs and provides a comprehensive overview of the available techniques to address such challenges. Firstly, we focus on the demand matching formulation of the power and bandwidth assignment. Secondly, we present the scheduling design in practical multibeam satellite systems. Finally, a number of future challenges and the respective open research topics are described. [less ▲]

Detailed reference viewed: 257 (84 UL)
Full Text
Peer Reviewed
See detailLEO Satellite Constellations for 5G and Beyond: How Will They Reshape Vertical Domains?
Liu, Shicong; Gao, Zhen; Wu, Yongpeng et al

in IEEE Communications Magazine (2021), 59(7), 30-36

The rapid development of communication technologies in the past decades has provided immense vertical opportunities for individuals and enterprises. However, conventional terrestrial cellular networks ... [more ▼]

The rapid development of communication technologies in the past decades has provided immense vertical opportunities for individuals and enterprises. However, conventional terrestrial cellular networks have unfortunately neglected the huge geographical digital divide, s ince high-bandwidth wireless coverage is concentrated in urban areas. To meet the goal of “connecting the unconnected,” integrating low Earth orbit (LEO) satellites with the terrestrial cellular networks has been widely considered as a promising solution. In this article, we first introduce the development roadmap of LEO sa tellite constellations (SatCons), including early attempts in LEO satellites with the emerging LEO constellations. Further, we discuss the unique opportunities of employing LEO SatCons for the delivery of integrating 5G networks. Specifically, we present their key performance indicators, which offer important guidelines for the design of associated enabling techniques, and then discuss the potential impact of integrating LEO SatCons with typical 5G use cases, where we engrave our vision of various vertical domains reshaped by LEO SatCons. Technical challenges are finally provided to specify future research directions. [less ▲]

Detailed reference viewed: 40 (4 UL)
Full Text
Peer Reviewed
See detailA Cubesat-ready Phase Synchronization Digital Payload for Coherent Distributed Remote Sensing Missions
Querol, Jorge UL; Merlano Duncan, Juan Carlos UL; Martinez Marrero, Liz UL et al

Poster (2021, July 15)

Distributed antenna arrays, fractionated payloads and cooperative platforms can provide unprecedented performance in the next generation of spaceborne communications and remote sensing systems. Remote ... [more ▼]

Distributed antenna arrays, fractionated payloads and cooperative platforms can provide unprecedented performance in the next generation of spaceborne communications and remote sensing systems. Remote phase synchronization of physically separated oscillators is the first step towards a coherent operation of distributed systems. This work shows the preliminary results of a TDD remote phase synchronization algorithm with a master-follower architecture. Herein, we describe the implementation and validation of the proposed algorithm. The implementation has been conducted in a Cubesat-ready software defined radio and validated at the end-to-end satellite communications testbed available at the University of Luxembourg. [less ▲]

Detailed reference viewed: 91 (23 UL)
Full Text
Peer Reviewed
See detailHybrid Beamforming, User Scheduling, and Resource Allocation for Integrated Terrestrial-Satellite Communication
Peng, Deyi; Bandi, Ashok; Li, Yun et al

in IEEE Transactions on Vehicular Technology (2021), 70(9), 8868-8882

In this paper, we investigate hybrid beamforming, user scheduling, and resource allocation optimization based on spectrum coexisting forward transmission in integrated terrestrial-satellite network (ITSN ... [more ▼]

In this paper, we investigate hybrid beamforming, user scheduling, and resource allocation optimization based on spectrum coexisting forward transmission in integrated terrestrial-satellite network (ITSN) with the purpose of improving system sum rate and energy efficiency. Considering the limitation of on-board beamforming, a hybrid analog-digital beamforming scheme is designed under the scenario of millimeter wave (mmWave) coexisting in the ITSN framework. Besides, in order to further mitigate intra-beam and inter-beam interference, we propose an adaptive user scheduling scheme, which first determines the cluster center based on adaptive threshold, and then selects users with less channel correlation into a scheduling cluster. Moreover, we model system sum rate maximization problem that incorporates maximum power constrains and minimum data rate requirements. Combined with the aforementioned hybrid beamforming and user scheduling strategy, we formulate the sum rate maximizing problem to a pure power allocation issue. In view of the non-convexity and high complexity, we propose a feasible optimization method based on the minimum mean square error (MMSE) criterion and logarithmic linearization to optimize the power allocation for each user terminal (UT). Simulation results show that our proposed joint beamforming and resource allocation optimization scheduling scheme can achieve an attractive gain in system sum rate and energy efficiency compared with conservative beamforming and allocations. [less ▲]

Detailed reference viewed: 35 (4 UL)
Full Text
Peer Reviewed
See detailSecure Transmission in Cell-Free Massive MIMO With RF Impairments and Low-Resolution ADCs/DACs
Zhang, Xianyu; Liang, Tao; An, Kang et al

in IEEE Transactions on Vehicular Technology (2021), 70(9, Sept. 2021), 8937-8949

This paper considers the secure transmission in a cell-free massive MIMO system with imperfect radio frequency (RF) chains and low-resolution analog-to-digital converters (ADCs) and digital-to-analog ... [more ▼]

This paper considers the secure transmission in a cell-free massive MIMO system with imperfect radio frequency (RF) chains and low-resolution analog-to-digital converters (ADCs) and digital-to-analog converters (DACs) at both access points (APs) and legitimate users, where an active eavesdropper attempts to wiretap the confidential data. The Gaussian RF impairment model (GRFIM) and additive quantization noise model (AQNM) are used to evaluate the impacts of the RF impairments and low resolution ADCs/DACs, respectively. The analytical results of the linear minimum mean square error (MMSE) channel estimation show that there is nonzero floor on the estimation error with respect to the RF impairments, ADC/DAC precision and the pilot power of the eavesdropper which is different from the conventional case with perfect transceiver. Then, a tractable closed-form expression for the ergodic secrecy rate is obtained with respect to key system parameters, such as the antenna number per AP, the AP number, user number, quality factors of the ADC/DAC and the RF chain, pilot signal power of the eavesdropper, etc. Moreover, a compensation algorithm between the imperfect RF components and the inexpensive coarse ADCs/DACs is also presented. Finally, numerical results are provided to illustrate the efficiency of the achieved expressions and the devised algorithm, and show the effects of RF impairments and low resolution ADC/DAC on the secrecy performance. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailRandom access procedure over non-terrestrial networks: From theory to practice
Kodheli, Oltjon UL; Abdalla, Abdelrahman UL; Querol, Jorge UL et al

in IEEE Access (2021)

Non-terrestrial Networks (NTNs) have become an appealing concept over the last few years and they are foreseen as a cornerstone for the next generations of mobile communication systems. Despite opening up ... [more ▼]

Non-terrestrial Networks (NTNs) have become an appealing concept over the last few years and they are foreseen as a cornerstone for the next generations of mobile communication systems. Despite opening up new market opportunities and use cases for the future, the novel impairments caused by the signal propagation over the NTN channel, compromises several procedures of the current cellular standards. One of the first and most important procedures impacted is the random access (RA) procedure, which is mainly utilized for achieving uplink synchronization among users in several standards, such as the fourth and fifth generation of mobile communication (4 & 5G) and narrowband internet of things (NB-IoT). In this work, we analyse the challenges imposed by the considerably increased delay in the communication link on the RA procedure and propose new solutions to overcome those challenges. A trade-off analysis of various solutions is provided taking into account also the already existing ones in the literature. In order to broaden the scope of applicability, we keep the analysis general targeting 4G, 5G and NB-IoT systems since the RA procedure is quasi-identical among these technologies. Last but not least, we go one step further and validate our techniques in an experimental setup, consisting of a user and a base station implemented in open air interface (OAI), and an NTN channel implemented in hardware that emulates the signal propagation delay. The laboratory test-bed built in this work, not only enables us to validate various solutions, but also plays a crucial role in identifying novel challenges not previously treated in the literature. Finally, an important key performance indicator (KPI) of the RA procedure over NTN is shown, which is the time that a single user requires to establish a connection with the base station. [less ▲]

Detailed reference viewed: 75 (12 UL)
Full Text
Peer Reviewed
See detailNB-IoT via LEO satellites: An efficient resource allocation strategy for uplink data transmission
Kodheli, Oltjon UL; Maturo, Nicola; Chatzinotas, Symeon UL et al

in IEEE Internet of Things Journal (2021)

Detailed reference viewed: 45 (4 UL)
Full Text
Peer Reviewed
See detailMulti-Antenna Data-Driven Eavesdropping Attacks and Symbol-Level Precoding Countermeasures
Mayouche, Abderrahmane UL; Alves Martins, Wallace UL; Tsinos, Christos UL et al

Poster (2021, June 21)

In this work, we consider secure communications in wireless multi-user (MU) multiple-input single-output (MISO) systems with channel coding in the presence of a multi-antenna eavesdropper (Eve), who is a ... [more ▼]

In this work, we consider secure communications in wireless multi-user (MU) multiple-input single-output (MISO) systems with channel coding in the presence of a multi-antenna eavesdropper (Eve), who is a legit user trying to eavesdrop other users. In this setting, we exploit machine learning (ML) tools to design soft and hard decoding schemes by using precoded pilot symbols as training data. The proposed ML frameworks allow an Eve to determine the transmitted message with high accuracy. We thereby show that MU-MISO systems are vulnerable to such eavesdropping attacks even when relatively secure transmission techniques are employed, such as symbol-level precoding (SLP). To counteract this attack, we propose two novel SLP-based schemes that increase the bit-error rate at Eve by impeding the learning process. We design these two security-enhanced schemes to meet different requirements regarding runtime, security, and power consumption. Simulation results validate both the ML-based eavesdropping attacks as well as the countermeasures, and show that the gain in security is achieved without affecting the decoding performance at the intended users. [less ▲]

Detailed reference viewed: 64 (8 UL)
Full Text
Peer Reviewed
See detailMassive MIMO under Double Scattering Channels: Power Minimization and Congestion Controls
Trinh, van Chien UL; Ngo, Quoc Hien; Chatzinotas, Symeon UL et al

in Massive MIMO under Double Scattering Channels: Power Minimization and Congestion Controls (2021, June 14)

This paper considers a massive MIMO system under the double scattering channels. We derive a closed-form expression of the uplink ergodic spectral efficiency (SE) by exploiting the maximum-ratio combining ... [more ▼]

This paper considers a massive MIMO system under the double scattering channels. We derive a closed-form expression of the uplink ergodic spectral efficiency (SE) by exploiting the maximum-ratio combining technique with imperfect channel state information. We then formulate and solve a total uplink data power optimization problem that aims at simultaneously satisfying the required SEs from all the users with limited power resources. We further propose algorithms to cope with the congestion issue appearing when at least one user is served by lower SE than requested. Numerical results illustrate the effectiveness of our proposed power optimization. More importantly, our proposed congestion-handling algorithms can guarantee the required SEs to many users under congestion, even when the SE requirement is high. [less ▲]

Detailed reference viewed: 83 (13 UL)
Full Text
Peer Reviewed
See detailSecure Vehicular Communications Through Reconfigurable Intelligent Surfaces
Ai, Yun; De Figueiredo, Felipe A.P; Kong, Long et al

in IEEE Transactions on Vehicular Technology (2021), 70(7), 7272-7276

Reconfigurable intelligent surfaces (RIS) is considered as a revolutionary technique to improve the wireless system performance by reconfiguring the radio wave propagation environment artificially ... [more ▼]

Reconfigurable intelligent surfaces (RIS) is considered as a revolutionary technique to improve the wireless system performance by reconfiguring the radio wave propagation environment artificially. Motivated by the potential of RIS in vehicular networks, we analyze the secrecy outage performance of RIS-aided vehicular communications in this paper. More specifically, two vehicular communication scenarios are considered, i.e., a vehicular-to-vehicular (V2V) communication where the RIS acts as a relay and a vehicular-to-infrastructure (V2I) scenario where the RIS functions as the receiver. In both scenarios, a passive eavesdropper is present attempting to retrieve the transmitted information. Closed-form expressions for the secrecy outage probability (SOP) are derived and verified. The results demonstrate the potential of improving secrecy with the aid of RIS under both V2V and V2I communications. [less ▲]

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailPerformance Enhancement for Full-Duplex Relaying with Time-Switching-Based SWIPT in Wireless Sensors Networks
Tran, Phu Tin; Nguyen Nhat, ; Tran Dinh, Hieu UL et al

in Sensors (2021), 21(11), 3847

Full-duplex (FD) with simultaneous wireless information and power transfer (SWIPT) in wireless ad hoc networks has received increased attention as a technology for improving spectrum and energy efficiency ... [more ▼]

Full-duplex (FD) with simultaneous wireless information and power transfer (SWIPT) in wireless ad hoc networks has received increased attention as a technology for improving spectrum and energy efficiency. This paper studies the outage performance for a SWIPT-based decode-and-forward (DF) FD relaying network consisting of a single-antenna source S, a two-antenna relay R, and a multi-antenna destination D. Specifically, we propose four protocols, namely static time-switching factor with selection combining (STSF-SC), static time-switching factor with maximal ratio combining (STSF-MRC), optimal dynamic time-switching factor with selection combining (ODTSF-SC), and optimal dynamic time-switching factor with maximal ratio combining (ODTSF-MRC) to fully investigate the outage performance of the proposed system. In particular, the optimal time-switching factor from the ODTSF-SC and ODTSF-MRC methods is designed to maximize the total received data at the destination. In this context, we derive exact closed-formed expressions for all schemes in terms of the outage probability (OP). Finally, the Monte Carlo simulations are conducted to corroborate the theoretical analysis’s correctness and the proposed schemes’ effectiveness. [less ▲]

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailA design strategy for phase synchronization in Precoding-enabled DVB-S2X user terminals
Martinez Marrero, Liz UL; Merlano Duncan, Juan Carlos UL; Querol, Jorge UL et al

Scientific Conference (2021, June)

This paper address the design of a phase tracking block for the DVB-S2X user terminals in a satellite precoding system. The spectral characteristics of the phase noise introduced by the oscillator, the ... [more ▼]

This paper address the design of a phase tracking block for the DVB-S2X user terminals in a satellite precoding system. The spectral characteristics of the phase noise introduced by the oscillator, the channel, and the thermal noise at the receiver are taken into account. Using the expected phase noise mask, the optimal parameters for a second-order PLL intended to track channel variations from the pilots are calculated. To validate the results a Simulink model was implemented considering the characteristics of the hardware prototype. The performance of the design was evaluated in terms of the accuracy and stability for the frame structure of superframe Format 2, as described in Annex E of DVB-S2X. [less ▲]

Detailed reference viewed: 133 (21 UL)
Full Text
Peer Reviewed
See detailChannel Modeling and Analysis of Reconfigurable Intelligent Surfaces Assisted Vehicular Networks
Kong, Long UL; He, Jiguang; Ai, Yun et al

Scientific Conference (2021, June)

Detailed reference viewed: 99 (10 UL)
Full Text
Peer Reviewed
See detailOn the Secrecy-Reliability Performance Trade-off for NOMA-enabled 5G mmWave Networks
Solanki, Sourabh UL; Gurjar, Devendra S.; Sharma, Pankaj K. et al

in 2021 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 2021) (2021)

The evolution of 5G wireless networks poses significant research challenges such as securing the user data, maintaining certain latency and reliability requirements etc. However, it can be challenging to ... [more ▼]

The evolution of 5G wireless networks poses significant research challenges such as securing the user data, maintaining certain latency and reliability requirements etc. However, it can be challenging to simultaneously meet these performance requisites, which may lead to resort to a trade-off among different metrics. This paper investigates the secrecy-reliability performance trade-off (SRPT) for non-orthogonal multiple access (NOMA)-based millimeter wave (mmWave) networks. Herein, we consider two end-users, namely primary and secondary, which are served by an mmWave base station using downlink NOMA. Besides, a passive eavesdropper lying in the vicinity of these end-users attempts to intercept their legitimate message signals. For this set-up, we derive the closed-form expressions of the outage probability (OP) of a targeted end-user and intercept probability (IP) of the eavesdropper to analyze the SRPT of the system. We further propose a low-complexity average channel state information (CSI)-based power allocation strategy to improve the reliability of a targeted user while maintaining its information secrecy. Moreover, we obtain the condition under which NOMA guarantees superior secrecy performance than that of orthogonal multiple access (OMA) scheme. We corroborate our theoretical analysis via simulation results presented in terms of IP and OP. [less ▲]

Detailed reference viewed: 97 (22 UL)
Full Text
Peer Reviewed
See detailSecure Energy Efficiency Maximization in Cognitive Satellite-Terrestrial Networks
Lu, Weixin; An, Kang; Liang, Tao et al

in IEEE Systems Journal (2021), 15(2), 2382-2385

This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for ... [more ▼]

This article investigates the secure energy efficiency (EE) optimization problem in a cognitive satellite-terrestrial network with a capable eavesdropper. The objective is to maximize the secure EE for the primary satellite network while satisfying the allowable signal-to-interference-plus-noise ratio requirements of the secondary and primary users along within the transmit power limitation of both satellite and the terrestrial base station. Owing to the nonconvexity and intractability of the original optimization problem, a beamforming scheme and associated transformation algorithms are proposed by jointly applying the Taylor approximation, fraction programming, and alternating search to cope with the implementation difficulty. The key is to convert the original optimization problem into a simple convex framework and obtain the optimal solution step by step. Finally, numerical simulations are given to verify the feasibility and practicability of the proposed optimization algorithms. [less ▲]

Detailed reference viewed: 64 (7 UL)
Full Text
Peer Reviewed
See detailExploiting Jamming Attacks for Energy Harvesting in Massive MIMO Systems
Al-Hraishawi, Hayder UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

Scientific Conference (2021, June)

In this paper, the performance of an RF energy harvesting scheme for multi-user massive multiple-input multiple-output (MIMO) is investigated in the presence of multiple active jammers. The key idea is to ... [more ▼]

In this paper, the performance of an RF energy harvesting scheme for multi-user massive multiple-input multiple-output (MIMO) is investigated in the presence of multiple active jammers. The key idea is to exploit the jamming transmissions as an energy source to be harvested at the legitimate users. To this end, the achievable uplink sum rate expressions are derived in closed-form for two different antenna configurations. An optimal time-switching policy is also proposed to ensure user-fairness in terms of both harvested energy and achievable rate. Besides, the essential trade-off between the harvested energy and achievable sum rate are quantified in closed-form. Our analysis reveals that the massive MIMO systems can make use of RF signals of the jamming attacks for boosting the amount of harvested energy at the served users. Numerical results illustrate the effectiveness of the derived closed-form expressions over Monte-Carlo simulations. [less ▲]

Detailed reference viewed: 56 (5 UL)
Full Text
Peer Reviewed
See detailBroadband Non-Geostationary Satellite Communication Systems: Research Challenges and Key Opportunities
Al-Hraishawi, Hayder UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

Scientific Conference (2021, June)

Besides conventional geostationary (GSO) satellite broadband communication services, non-geostationary (NGSO) satellites are envisioned to support various new communication use cases from countless ... [more ▼]

Besides conventional geostationary (GSO) satellite broadband communication services, non-geostationary (NGSO) satellites are envisioned to support various new communication use cases from countless industries. These new scenarios bring many unprecedented challenges that will be discussed in this paper alongside with several potential future research opportunities. NGSO systems are known for various advantages, including their important features of low cost, lower propagation delay, smaller size, and lower losses in comparison to GSO satellites. However, there are still many deployment challenges to be tackled to ensure seamless integration not only with GSO systems but also with terrestrial networks. In this paper, we discuss several key challenges including satellite constellation and architecture designs, coexistence with GSO systems in terms of spectrum access and regulatory issues, resource management algorithms, and NGSO networking requirements. Additionally, the latest progress in provisioning secure communication via NGSO systems is discussed. Finally, this paper identifies multiple important open issues and research directions to inspire further studies towards the next generation of satellite networks. [less ▲]

Detailed reference viewed: 56 (10 UL)
Full Text
Peer Reviewed
See detailEnergy Efficiency Optimization Technique for SWIPT-enabled Multi-Group Multicasting Systems with Heterogeneous Users
Gautam, Sumit UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

Poster (2021, June)

We consider a multi-group (MG) multicasting (MC) system wherein a multi-antenna transmitter serves heterogeneous users capable of either information decoding (ID) or energy harvesting (EH), or both. In ... [more ▼]

We consider a multi-group (MG) multicasting (MC) system wherein a multi-antenna transmitter serves heterogeneous users capable of either information decoding (ID) or energy harvesting (EH), or both. In this context, we investigate a precoder design framework to explicitly serve the ID and EH users categorized within certain MC and EH groups. Specifically, the ID users are categorized within multiple MC groups while the EH users are a part of single (last) group. We formulate a problem to optimize the energy efficiency in the considered scenario under a quality-of-service (QoS) constraint. An algorithm based on Dinkelback method, slack-variable replacement, and second-order conic programming (SOCP)/semi-definite relaxation (SDR) is proposed to obtain a suitable solution for the above-mentioned fractional-objective dependent non-convex problem. Simulation results illustrate the benefits of proposed algorithm under several operating conditions and parameter values, while drawing a comparison between the two proposed methods. [less ▲]

Detailed reference viewed: 81 (11 UL)
Full Text
Peer Reviewed
See detailEnergy Minimization in UAV-Aided Networks: Actor-Critic Learning for Constrained Scheduling Optimization
Yuan, Yaxiong UL; Lei, Lei UL; Vu, Thang Xuan UL et al

in IEEE Transactions on Vehicular Technology (2021)

In unmanned aerial vehicle (UAV) applications, the UAV's limited energy supply and storage have triggered the development of intelligent energy-conserving scheduling solutions. In this paper, we ... [more ▼]

In unmanned aerial vehicle (UAV) applications, the UAV's limited energy supply and storage have triggered the development of intelligent energy-conserving scheduling solutions. In this paper, we investigate energy minimization for UAV-aided communication networks by jointly optimizing data-transmission scheduling and UAV hovering time. The formulated problem is combinatorial and non-convex with bilinear constraints. To tackle the problem, firstly, we provide an optimal relax-and-approximate solution and develop a near-optimal algorithm. Both the proposed solutions are served as offline performance benchmarks but might not be suitable for online operation. To this end, we develop a solution from a deep reinforcement learning (DRL) aspect. The conventional RL/DRL, e.g., deep Q-learning, however, is limited in dealing with two main issues in constrained combinatorial optimization, i.e., exponentially increasing action space and infeasible actions. The novelty of solution development lies in handling these two issues. To address the former, we propose an actor-critic-based deep stochastic online scheduling (AC-DSOS) algorithm and develop a set of approaches to confine the action space. For the latter, we design a tailored reward function to guarantee the solution feasibility. Numerical results show that, by consuming equal magnitude of time, AC-DSOS is able to provide feasible solutions and saves 29.94% energy compared with a conventional deep actor-critic method. Compared to the developed near-optimal algorithm, AC-DSOS consumes around 10% higher energy but reduces the computational time from minute-level to millisecond-level. [less ▲]

Detailed reference viewed: 98 (27 UL)
Full Text
Peer Reviewed
See detailTrend-Aware Proactive Caching via Tensor Train Decomposition: A Bayesian Viewpoint
Mehrizi Rahmat Abadi, Sajad UL; X. Vu, Thang; Chatzinotas, Symeon UL et al

in IEEE Open Journal of the Communications Society (2021), (4369),

Detailed reference viewed: 81 (11 UL)