{"paper":{"title":"Machine Learning-Based Antenna Selection in Untrusted Relay Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"eess.SP","authors_text":"Nan Qi, Rugui Yao, Theodoros A. Tsiftsis, Yuxin Zhang","submitted_at":"2018-12-26T14:01:08Z","abstract_excerpt":"This paper studies the transmit antenna selection based on machine learning (ML) schemes in untrusted relay networks. First, we state the conventional antenna selection scheme. Then, we implement three ML schemes, namely, the support vector machine-based scheme, the naive-Bayes-based scheme, and the k-nearest neighbors-based scheme, which are applied to select the best antenna with the highest secrecy rate. The simulation results are presented in terms of system secrecy rate and secrecy outage probability. From the simulation, we can conclude that the proposed ML-based antenna selection scheme"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1812.10318","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"}