Sang Quang Nguyen
YOU?
Author Swipe
View article: On the performance of active RIS-enhanced NOMA systems with spectrum sharing mechanisms
On the performance of active RIS-enhanced NOMA systems with spectrum sharing mechanisms Open
This paper presents a comprehensive performance analysis of a downlink non-orthogonal multiple access (NOMA) network assisted by an active reconfigurable intelligent surface (ARIS) in a cognitive spectrum-sharing scenario. Unlike conventio…
View article: On performance of wireless-powered-based short-packet systems under multiple co-channel interference
On performance of wireless-powered-based short-packet systems under multiple co-channel interference Open
This paper explores the performance of wireless-powered-based short-packet communication systems in light of multiple interference sources. In which, a source node uses energy harvested from multiple power beacons to serve its destination,…
View article: Covert communication performance evaluation in UAV-assisted rate-splitting multiple access systems
Covert communication performance evaluation in UAV-assisted rate-splitting multiple access systems Open
In this paper, we investigate using rate-splitting multiple access (RSMA) to facilitate covert communication in a multi-user unmanned aerial vehicle (UAV) downlink communication network that is being monitored by a warden (Willie). We esta…
View article: Physical Layer Security for Keyhole-based NOMA Downlink Systems with a Multi-antenna Eavesdropper
Physical Layer Security for Keyhole-based NOMA Downlink Systems with a Multi-antenna Eavesdropper Open
This paper investigates the physical layer security of downlink nonorthogonal multiple access (NOMA) systems operating over a degenerate keyhole channel in the presence of a multi-antenna eavesdropper. We propose a joint antenna selection …
View article: Can LLMs Play Ô Ăn Quan Game? A Study of Multi-Step Planning and Decision Making
Can LLMs Play Ô Ăn Quan Game? A Study of Multi-Step Planning and Decision Making Open
In this paper, we explore the ability of large language models (LLMs) to plan and make decisions through the lens of the traditional Vietnamese board game, Ô Ăn Quan. This game, which involves a series of strategic token movements and capt…
View article: Multi-Power Beacon Empowered Secure In Iot Networks: Secrecy Outage Probability Analysis
Multi-Power Beacon Empowered Secure In Iot Networks: Secrecy Outage Probability Analysis Open
This paper investigates the physical-layer secure performance of a multi-power beacon-empowered wirelessly powered communication system in the surveillance of an external eavesdropper. Specifically, a limited-energy source harvests energy …
View article: Hybrid Satellite-Terrestrial Relaying Networks With Imperfect Channel State Information and Directional Antenna: the Dilemma of Facilitating Reliability and Improving Security
Hybrid Satellite-Terrestrial Relaying Networks With Imperfect Channel State Information and Directional Antenna: the Dilemma of Facilitating Reliability and Improving Security Open
The performance of hybrid satellite-terrestrial relaying (HSTR) networks is investigated in this work. Specifically, we examine the trade-off between reliability and security in HSTR networks using two key parameters: outage probability (O…
View article: Enabling D2D Transmission Mode of Reconfigurable Intelligent Surfaces Aided in Wireless NOMA System
Enabling D2D Transmission Mode of Reconfigurable Intelligent Surfaces Aided in Wireless NOMA System Open
Reconfigurable Intelligent Surfaces (RISs) are emerging as a promising alternative for future wireless networks. This study investigates deviceto-device (D2D) communication systems using nonorthogonal multiple access (NOMA) and RISs betwee…
View article: A Large-Scale Benchmark for Vietnamese Sentence Paraphrases
A Large-Scale Benchmark for Vietnamese Sentence Paraphrases Open
This paper presents ViSP, a high-quality Vietnamese dataset for sentence paraphrasing, consisting of 1.2M original-paraphrase pairs collected from various domains. The dataset was constructed using a hybrid approach that combines automatic…
View article: Statistical Analysis of the Sum of Double Random Variables for Security Applications in RIS-Assisted NOMA Networks with a Direct Link
Statistical Analysis of the Sum of Double Random Variables for Security Applications in RIS-Assisted NOMA Networks with a Direct Link Open
Next- generation wireless communications are projected to integrate reconfigurable intelligent surfaces (RISs) to perpetrate enhanced spectral and energy efficiencies. To quantify the performance of RIS-aided wireless networks, the statist…
View article: Performance of RIS-Secured Short-Packet NOMA Systems With Discrete Phase-Shifter to Protect Digital Content and Copyright Against Untrusted User
Performance of RIS-Secured Short-Packet NOMA Systems With Discrete Phase-Shifter to Protect Digital Content and Copyright Against Untrusted User Open
Future wireless communications are expected to serve a wide range of emerging applications, such as Online Gaming, Extended Reality (XR), Metaverses, Healthcare or Telemetry, where communication from diverse connected Internet of Things (I…
View article: Precise Analysis of Secrecy Outage Probability and Eavesdropping Strategies in Secure, Energy-Efficient Wireless Networks for Copyright Protection of Digital Contents
Precise Analysis of Secrecy Outage Probability and Eavesdropping Strategies in Secure, Energy-Efficient Wireless Networks for Copyright Protection of Digital Contents Open
Nowadays, the emergence of digital applications such as online gaming, extended reality (XR), and the Metaverse, causes the increasing demand of copyright data protection. The copyright data may be encrypted and transferred over communicat…
View article: Securing Wireless Communications with Energy Harvesting and Multi-antenna Diversity
Securing Wireless Communications with Energy Harvesting and Multi-antenna Diversity Open
This paper proposes a secure wireless communication system that integrates Physical Layer Security (PLS) with Energy Harvesting (EH) to improve both data confidentiality and network sustainability. The system model consists of a source nod…
View article: Securing Short-Packet Transmissions Via Partial-Noma: Performance Analysis Under Keyhole Fading
Securing Short-Packet Transmissions Via Partial-Noma: Performance Analysis Under Keyhole Fading Open
View article: A Large-Scale Benchmark for Vietnamese Sentence Paraphrases
A Large-Scale Benchmark for Vietnamese Sentence Paraphrases Open
View article: Outage Performance Analysis of STAR-RIS-NOMA Networks under Imperfect CSI
Outage Performance Analysis of STAR-RIS-NOMA Networks under Imperfect CSI Open
In this paper, we investigate the performance of simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs)-assisted non-orthogonal multiple access (NOMA) networks under imperfect channel state information (…
View article: Analysis of symbiotic backscatter empowered wireless sensors network with short-packet communications
Analysis of symbiotic backscatter empowered wireless sensors network with short-packet communications Open
Recent progress studies in light of wireless communication systems mainly centred around two focuses: zero-energy consumption and ultra-reliable and low-latency communication (URLLC). Among various cutting-edge areas, exploiting ambient ba…
View article: Security and Reliability Analysis of the Power Splitting-Based Relaying in Wireless Sensors Network
Security and Reliability Analysis of the Power Splitting-Based Relaying in Wireless Sensors Network Open
This paper studies the security and reliability of the power splitting (PS)-based relaying in the Internet of Things (IoT) networks with the help of a jammer. Based on the considered system model, we derive outage probability (OP) and inte…
View article: Short Packet Communications for Relay Systems With Co-Channel Interference at Relay: Performance Analysis and Power Control
Short Packet Communications for Relay Systems With Co-Channel Interference at Relay: Performance Analysis and Power Control Open
In this paper, we evaluate short packet communication (SPC) for a cooperative system where one relay assists data transmission between one multi-antenna source and one single antenna destination with the presence of co-channel interference…
View article: On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming
On the Security and Reliability Trade-off of the Satellite Terrestrial Networks with Fountain Codes and Friendly Jamming Open
The performance of the satellite-terrestrial network with Fountain codes (FCs) is conducted in the present work. More precisely, the air-to-ground link is modeled according to the shadow-Rician distribution to capture the strong light-of-s…
View article: Learning Adaptive Quantization Parameter for Consistent Quality Oriented Video Coding
Learning Adaptive Quantization Parameter for Consistent Quality Oriented Video Coding Open
In the industry 4.0 era, video applications such as surveillance visual systems, video conferencing, or video broadcasting have been playing a vital role. In these applications, for manipulating and tracking objects in decoded video, the q…
View article: Learning adaptive motion search for fast versatile video coding in visual surveillance systems
Learning adaptive motion search for fast versatile video coding in visual surveillance systems Open
Visual surveillance systems have been playing an important role in monitoring and managing at public areas. However, the computational complexity of video compression in these applications is still a great challenge. To meet practical requ…
View article: Learning Adaptive Quantization Parameter for Consistent Quality Oriented Video Coding
Learning Adaptive Quantization Parameter for Consistent Quality Oriented Video Coding Open
In industry 4.0 era, video applications such as surveillance visual systems, video conferencing, or video broadcasting have been playing a vital role. In these applications, for manipulating and tracking objects in decoded video, the quali…
View article: Security–Reliability Analysis of AF Full-Duplex Relay Networks Using Self-Energy Recycling and Deep Neural Networks
Security–Reliability Analysis of AF Full-Duplex Relay Networks Using Self-Energy Recycling and Deep Neural Networks Open
This paper investigates the security–reliability of simultaneous wireless information and power transfer (SWIPT)-assisted amplify-and-forward (AF) full-duplex (FD) relay networks. In practice, an AF-FD relay harvests energy from the source…
View article: Performance statistics of broadcasting networks with receiver diversity and Fountain codes
Performance statistics of broadcasting networks with receiver diversity and Fountain codes Open
The performance of broadcasting networks employing Fountain codes with receiver diversity techniques is investigated in the present work. Particularly, we derive the closed-form expressions of the cumulative distribution function (CDF), th…
View article: Exploiting User Clustering and Fixed Power Allocation for Multi-Antenna UAV-Assisted IoT Systems
Exploiting User Clustering and Fixed Power Allocation for Multi-Antenna UAV-Assisted IoT Systems Open
Internet of Things (IoT) systems cooperative with unmanned aerial vehicles (UAVs) have been put into use for more than ten years, from transportation to military surveillance, and they have been shown to be worthy of inclusion in the next …
View article: On the security and reliability performance of SWIPT-enabled full-duplex relaying in the non-orthogonal multiple access networks
On the security and reliability performance of SWIPT-enabled full-duplex relaying in the non-orthogonal multiple access networks Open
The performance of the simultaneous wireless information and power transfer (SWIPT) enabled full-duplex (FD) relaying in non-orthogonal multiple access (NOMA) networks is investigated in both reliability and security aspects. More precisel…
View article: Performance Analysis of Multihop Full-Duplex NOMA Systems with Imperfect Interference Cancellation and Near-Field Path-Loss
Performance Analysis of Multihop Full-Duplex NOMA Systems with Imperfect Interference Cancellation and Near-Field Path-Loss Open
Outage probability (OP) and potential throughput (PT) of multihop full-duplex (FD) nonorthogonal multiple access (NOMA) systems are addressed in the present paper. More precisely, two metrics are derived in the closed-form expressions unde…
View article: Performance Prediction in UAV-Terrestrial Networks With Hardware Noise
Performance Prediction in UAV-Terrestrial Networks With Hardware Noise Open
To enhance the service quality of the unmanned aerial vehicle (UAV), the UAV-aided Internet
\nof Things (IoT) systems could deploy a Deep Neural Network (DNN) for performance prediction for the
\nusers. Non-orthogonal multiple access (NOMA…
View article: Performance on Cognitive Broadcasting Networks Employing Fountain Codes and Maximal Ratio Transmission
Performance on Cognitive Broadcasting Networks Employing Fountain Codes and Maximal Ratio Transmission Open
The comprehensive performance of cognitive broadcasting networks employing Fountain codes (FC) and maximal ratio transmission (MRT) is investigated in the present paper. More precisely, the secondary transmitter (ST) employs Fountain code …