[1] J. Qian, F. Gao, G. Wang, S. Jin and H. Zhu, "Noncoherent Detections for Ambient Backscatter System,"IEEE Trans. on Wireless Communications, vol. 16, no. 3, pp. 1412-1422, March 2017.
[2] C. Zhong et al., "Wireless Information and Power Transfer with Full Duplex Relaying," IEEE Trans. onCommunications, vol. 62, no. 10, pp. 3447-3461, Oct. 2014.
[3] G. Wang, F. Gao, R. Fan and C. Tellambura, "Ambient Backscatter Communication Systems: Detectionand Performance Analysis," IEEE Trans. on Communications, vol. 64, no. 11, pp. 4836-4846, Nov. 2016.
[4] J. D. Griffin and G. D. Durgin, "Gains for RF Tags Using Multiple Antennas," IEEE Transactions onAntennas and Propagation, vol. 56, no. 2, pp. 563-570, DOI: 10.1109/TAP.2007.915423, Feb. 2008.
[5] G. Lu, Z. Liu, Y. Ye and X. Chu, "System Outage Probability and Diversity Analysis of a SWIPT-basedtwo-way DF Relay Network under Transceiver Hardware Impairments," China Communications, vol. 20, no. 10, pp. 120-135, DOI:10.23919/JCC.ea.2021-0184.202302, 2023.
[6] J. D. Griffin and G. D. Durgin, "Link Envelope Correlation in the Backscatter Channel," IEEECommunications Letters, vol. 11, no. 9, pp. 735-737, Sep. 2007.
[7] D. -Y. Kim et al., "Reverse-link Interrogation Range of a UHF MIMO-RFID System in Nakagami-mFading Channels," IEEE Transactions on Industrial Electronics, vol. 57, no. 4, pp. 1468-1477, April 2010.
[8] E. Vahedi, R. K. Ward and I. F. Blake, "Security Analysis and Complexity Comparison of Some RecentLightweight RFID Protocols," Proc. of the 4th Int. Conf. on Computational Intelligence Security Inf. Syst.", vol. 6694, pp. 92-99, Spain, Jun. 2011.
[9] A. Paul et al., "Designing Quantum Gradient Descent Algorithm for MIMO NOMA Rate Maximizationwith STAR-RIS," IEEE Wireless Communications Letters, vol. 14, no. 4, pp. 959-963, April 2025.
[10] X. Li et al., "Physical Layer Security for Wireless-powered Ambient Backscatter CooperativeCommunication Networks," IEEE Transactions on Cognitive Communications and Networking, vol. 9, no. 4, pp. 927-939, Aug. 2023.
[11] Y. Khan, A. Afzal, A. Dubey and A. Saxena, "Secrecy Performance of Energy-harvesting BackscatterCommunication Network under Different Tag Selection Schemes," IEEE Journal of Radio Frequency Identification, vol. 8, pp. 43-48, DOI: 10.1109/JRFID.2024.3371877, 2024.
[12] Y. Khan et al., "Deep Learning-based Secure Tag Selection in BackCom Network with RIS-inducedInterference," IEEE Journal of Radio Frequency Identification, vol. 9, pp. 797-806, 2025.
[13] N. Q. Sang, T. C. Hung, T. T. Duy, M. Tran and B. Seo Kim, "Securing Wireless Communications withEnergy Harvesting and Multi-antenna Diversity," Jordanian Journal of Computers and Information Technology (JJCIT), vol. 11, no. 2, pp. 197-210, DOI: 10.5455/jjcit.71-1732244909, June 2025.
[14] M. Garai, M. Sliti and A. Elfikky, "Ground-to-Satellite FSO Communication: Evaluating ModulationTechniques under Cloud and Turbulence Effects," Jordanian Journal of Computers and Information Technology (JJCIT), vol. 11, no. 2, pp. 260-278, DOI: 10.5455/jjcit.71-1735327157, June 2025.
[15] Y. Khan, A. Dubey and S. K. Soman, "Secrecy Performance of Backscatter Communication Networkswith Multiple Reader and Tag Selection Schemes," Proc. of the IEEE 2025 National Conf. on Communications (NCC), pp. 1-6, Mar. 2025.
[16] M. Nafees, D. Dharmendra and A. Kumar, "Secrecy Analysis of Energy Harvesting BackscatterCommunications with Tag Selection in Nakagami-m Fading," arXiv preprint, arXiv: 2503.12400, 2025.
[17] W. Saad, X. Zhou, Z. Han and H. V. Poor, "On the Physical Layer Security of Backscatter WirelessSystems," IEEE Transactions on Wireless Communications, vol. 13, no. 6, pp. 3442-3451, June 2014.
[18] Q. Yang, H. -M. Wang, Y. Zhang and Z. Han, "Physical Layer Security in MIMO Backscatter WirelessSystems," IEEE Transactions on Wireless Communications, vol. 15, no. 11, pp. 7547-7560, Nov. 2016.
[19] T. Pecorella, L. Brilli and L. Mucchi, "The Role of Physical Layer Security in IoT: A Novel Perspective", Information, vol. 7, no. 3, http://www.mdpi.com/2078-2489/7/3/49, 2016.
[20] T. N. Nguyen et al., "Outage Performance of Satellite Terrestrial Full-duplex Relaying Networks withCo-channel Interference," IEEE Wireless Communi. Letters, vol. 11, no. 7, pp. 1478-1482, July 2022.
[21] T. N. Nguyen et al., "Energy Harvesting-based Spectrum Access with Incremental Cooperation, Relay Selection and Hardware Noises", Radio Engineering, vol. 26, no. 1, pp. 240-250, 2017.
[22] T. N. Nguyen, D. T. Do and P. T. Tran, "Time Switching for Wireless Communications with Full-duplexRelaying in Imperfect CSI Condition ", KSII Transactions on Internet and Information Systems, vol. 10, no. 11, pp. 5455-5475, DOI: 10.3837/tiis.2016.09.011, Sep. 2016.
[23] P. T. Tin, D. T. Hung, T. N. Nguyen and T. T. Duy, "Secrecy Performance Enhancement for UnderlayCognitive Radio Networks Employing Cooperative Multi-hop Transmission with and without Presence of Hardware Impairments", Entropy, vol. 21, no. 2, pp. 217, Feb. 2019.
[24] P. Fazio, "On the Effect of Coverage Range Extent on Next-cell Prediction Error for Vehicular Mobilityin 5G/6G Networks: A Novel Theoretic Model," IEEE Transactions on Vehicular Technology, vol. 74, no. 1, pp. 1489-1503, DOI: 10.1109/TVT.2024.3453450, Jan. 2025.
[25] Z. Li, G. Wang and M. Yang, "Performance Analysis of SWIPT-aided Satellite-terrestrial CooperativeNetwork", Proc. of the 2022 2nd Asia-Pacific Conf. on Comm. Technology and Computer Science (ACCTCS), pp. 252-256, Shenyang, China, DOI:10.1109/ACCTCS53867.2022.00059, 2022.
[26] Y. Zhang et al., "Secure Communications for Multi-tag Backscatter Systems," IEEE WirelessCommunication Letters, vol. 8, no. 4, pp. 1146-1149, DOI: 10.1109/LWC.2019.2909199, Aug. 2019.
[27] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 6th Edn., ISBN-13: 978-0-12-373637-6, New York, NY, USA: Academic Press, 2000.
[28] N. I. Miridakis et al., "Dual-hop Communication over a Satellite Relay and Shadowed Rician Channels,"IEEE Transactions on Vehicular Technology, vol. 64, no. 9, pp. 4031-4040, Sept. 2015.
[29] S. Neumark, Solution of Cubic and Quartic Equations, ISBN: 978-0-08-011220-6, Oxford: PergamonPress, 1965.
[30] B. Gu, D. Li, H. Ding, G. Wang and C. Tellambura, "Breaking the Interference and Fading Gridlock inBackscatter Communications: State-of-the-Art, Design Challenges and Future Directions," IEEE Communications Surveys & Tutorials, vol. 27, no. 2, pp. 870-911, 2025.
[31] S. Mondal et al., "A Comprehensive Survey on NOMA-based Backscatter Communication for IoTApplications," IEEE Internet of Things Journal, vol. 12, no. 12, pp. 18929-18953, 2025.
[32] M. Ahmed et al., "NOMA-based Backscatter Communications: Fundamentals, Applications andAdvancements," IEEE Internet of Things Journal, vol. 11, no. 11, pp. 19303-19327, 2024.
[33] S. Zargari, D. Galappaththige and C. Tellambura, "Transmit Power-efficient Beamforming Design forIntegrated Sensing and Backscatter Communication," IEEE Open Journal of the Communications Society, vol. 6, pp. 775-792, DOI: 10.1109/OJCOMS.2025.3527860, 2025.
[34] F. R. Ghadi, M. Kaveh, K.-K. Wong and Y. Zhang, "Performance Analysis of FAS-aided BackscatterCommunications," IEEE Wireless Communications Letters, vol. 13, no. 9, pp. 2412-2416, 2024.
[35] F. Xia, Z. Fei, X. Wang, P. Liu, J. Guo and Q. Wu, "Joint Waveform and Reflection Design for Sensing-assisted Secure RIS-based Backscatter Communication," IEEE Wireless Communications Letters, vol. 13, no. 5, pp. 1523-1527, DOI: 10.1109/LWC.2024.3381163, 2024.
[36] S. Jia et al., "Secrecy Performance Analysis of UAV-assisted Ambient Backscatter Communications withJamming," IEEE Transactions on Wireless Communications, vol. 23, no. 12, pp. 18111-18125, 2024.
[37] H. Luo et al., "Symbiotic Blockchain Consensus: Cognitive Backscatter Communications-enabledWireless Blockchain Consensus," IEEE/ACM Trans. on Networking, vol. 32, no. 6, pp. 5372-5387, 2024.
[38] L. S. Phu et al., "Enhancing Short-packet Communications: BLER Performance in RIS-assisted AmbientBackscatter NOMA Systems," PLoS ONE, vol. 20, no. 8, pp. 1-26, Aug. 2025.
[39] T. C. Hung, V. M. Bui, T. N. Nguyen and M. Voznak, "Power Beacon-assisted Energy HarvestingSymbiotic Radio Networks: Outage Performance," PLoS ONE, vol. 20, no. 2, pp. 1-16, Feb. 2025.
[40] A.-T. Le et al., "Performance Analysis of RIS-assisted Ambient Backscatter Communication Systems,"IEEE Wireless Communications Letters, vol. 13, no. 3, pp. 791-795, 2024.
[41] T.-H. T. Pham et al., "Performance Analysis in D2D Partial NOMA-assisted BackscatterCommunication," Advances in Electrical & Electronic Engineering, vol. 23, no. 3, DOI: 10.15598/aeee.v23i3.250314, 2025.
[42] T. C. Hung, Q. Sang Nguyen, V. M. Bui, T.-Q. Thi and N.-L. Nguyen, "Multi-power Beacon EmpoweredSecure in IoT Networks: Secrecy Outage Probability Analysis," Advances in Electrical & Electronic Engineering, vol. 23, no. 2, DOI: 10.15598/aeee.v23i2.241112, 2025.
[43] Y. Pei, X. Yue, C. Huang and Z. Lu, "Secrecy Performance Analysis of RIS-assisted Ambient BackscatterCommunication Networks," IEEE Transactions on Green Communications and Networking, vol. 8, no. 3, pp. 1222-1232, DOI: 10.1109/TGCN.2024.3365692, 2024.
[44] Y. Khan et al., "Secrecy Analysis of Energy Harvesting Backscatter Communication Networks withMultiple Eavesdroppers and Different Tag Selection Schemes," IEEE Transactions on Green Communications and Networking, Early Access, p. 1, DOI: 10.1109/TGCN.2025.3563107, 2025.
[45] J. Li, P. Wang, L. Jiao, Z. Yan, K. Zeng and Y. Yang, "Security Analysis of Triangle Channel-based Physical Layer Key Generation in Wireless Backscatter Communications," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 948-964, DOI: 10.1109/TIFS.2022.3224852, 2023.
[46] R. Singh, I. Ahmad and J. Huusko, "The Role of Physical Layer Security in Satellite-based Networks,"Proc. of the 2023 Joint European Conf. on Networks and Communications & 6G Summit (EuCNC/6G Summit), pp. 36-41, DOI: 10.1109/EuCNC/6GSummit58263.2023.10188370, 2023.
[47] S. Jia, R. Wang, Y. Xu, Y. Lou, D. Zhang and T. Sato, "Secrecy Analysis of ABCom-based IntelligentTransportation Systems with Jamming," IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 3, pp. 2880-2892, DOI: 10.1109/TITS.2023.3250427, 2024.
[48] Z. Liu, Y. Ye, X. Chu and H. Sun, "Secrecy Performance of Backscatter Communications with Multiple Self-powered Tags," IEEE Communications Letters, vol. 26, no. 12, pp. 2875-2879, 2022.
[49] L. Bai, Q. Chen, T. Bai and J. Wang, "UAV-enabled Secure Multiuser Backscatter Communications with Planar Array," IEEE Journal on Selected Areas in Communications, vol. 40, no. 10, p. 29462961, 2022.
[50] Y. Lei, Y. Ye, X. Chu, G. Chen and G. Lu, "On the Strict Secrecy Outage Probability of Wirelessly Powered Backscatter Communications," IEEE Transactions on Vehicular Technology, vol. 74, no. 5, pp. 8345-8350, DOI: 10.1109/TVT.2024.3523389, 2025.