<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10189676> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/title> "Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/ontology/bibo/abstract> "In this paper, we present a signaling design for secure integrated sensing and communication (ISAC) systems comprising a dual-functional multi-input multi-output (MIMO) base station (BS) that simultaneously communicates with multiple users while detecting targets present in their vicinity, which are regarded as potential eavesdroppers. In particular, assuming that the distribution of each parameter to be estimated is known \\textit{a priori}, we focus on optimizing the targets' sensing performance. To this end, we derive and minimize the Bayesian Cramér-Rao bound (BCRB), while ensuring certain communication quality of service (QoS) by exploiting constructive interference (CI). The latter scheme enforces that the received signals at the eavesdropping targets fall into the destructive region of the signal constellation, to deteriorate their decoding probability, thus enhancing the ISAC's system physical-layer security (PLS) capability. To tackle the nonconvexity of the formulated problem, a tailored successive convex approximation method is proposed for its efficient solution. Our extensive numerical results verify the effectiveness of the proposed secure ISAC design showing that the proposed algorithm outperforms block-level precoding techniques."^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/date> "2024-01-30" .
<https://discovery.ucl.ac.uk/id/document/1717548> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/ontology/bibo/volume> "abs/24" .
<https://discovery.ucl.ac.uk/id/org/ext-91b21bc7ed40b025418918cf96ff7092> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-91b21bc7ed40b025418918cf96ff7092> <http://xmlns.com/foaf/0.1/name> "ArXiv"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-91b21bc7ed40b025418918cf96ff7092> .
<https://discovery.ucl.ac.uk/id/publication/ext-fe3cc0cad7814c13bcbf7b11398bbb59> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Collection> .
<https://discovery.ucl.ac.uk/id/publication/ext-fe3cc0cad7814c13bcbf7b11398bbb59> <http://xmlns.com/foaf/0.1/name> "CoRR"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/publication/ext-fe3cc0cad7814c13bcbf7b11398bbb59> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-f456414a58fcb1270687679672df0f16> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10189676#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10189676#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-f456414a58fcb1270687679672df0f16> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-3d337ff63e8b39a8949fa0b79967fe6f> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10189676#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10189676#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-3d337ff63e8b39a8949fa0b79967fe6f> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-0e2162387237b2df3ea72cddb6d6fa7e> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10189676#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10189676#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-0e2162387237b2df3ea72cddb6d6fa7e> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-658cf715c65509e3722b8588a4f16cd2> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10189676#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10189676#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_4> <https://discovery.ucl.ac.uk/id/person/ext-658cf715c65509e3722b8588a4f16cd2> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-07ad9c13eed1f8138e4d700ff4e4e313> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10189676#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10189676#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_5> <https://discovery.ucl.ac.uk/id/person/ext-07ad9c13eed1f8138e4d700ff4e4e313> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-d1e2c7384b89bcf56aebc4329e2f1a33> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10189676#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10189676#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_6> <https://discovery.ucl.ac.uk/id/person/ext-d1e2c7384b89bcf56aebc4329e2f1a33> .
<https://discovery.ucl.ac.uk/id/person/ext-0e2162387237b2df3ea72cddb6d6fa7e> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-0e2162387237b2df3ea72cddb6d6fa7e> <http://xmlns.com/foaf/0.1/givenName> "Christos"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-0e2162387237b2df3ea72cddb6d6fa7e> <http://xmlns.com/foaf/0.1/familyName> "Masouros"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-0e2162387237b2df3ea72cddb6d6fa7e> <http://xmlns.com/foaf/0.1/name> "Christos Masouros"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-d1e2c7384b89bcf56aebc4329e2f1a33> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-d1e2c7384b89bcf56aebc4329e2f1a33> <http://xmlns.com/foaf/0.1/givenName> "Qinyu"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-d1e2c7384b89bcf56aebc4329e2f1a33> <http://xmlns.com/foaf/0.1/familyName> "Zhang"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-d1e2c7384b89bcf56aebc4329e2f1a33> <http://xmlns.com/foaf/0.1/name> "Qinyu Zhang"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-658cf715c65509e3722b8588a4f16cd2> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-658cf715c65509e3722b8588a4f16cd2> <http://xmlns.com/foaf/0.1/givenName> "George C"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-658cf715c65509e3722b8588a4f16cd2> <http://xmlns.com/foaf/0.1/familyName> "Alexandropoulos"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-658cf715c65509e3722b8588a4f16cd2> <http://xmlns.com/foaf/0.1/name> "George C Alexandropoulos"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-f456414a58fcb1270687679672df0f16> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-f456414a58fcb1270687679672df0f16> <http://xmlns.com/foaf/0.1/givenName> "Nanchi"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-f456414a58fcb1270687679672df0f16> <http://xmlns.com/foaf/0.1/familyName> "Su"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-f456414a58fcb1270687679672df0f16> <http://xmlns.com/foaf/0.1/name> "Nanchi Su"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-07ad9c13eed1f8138e4d700ff4e4e313> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-07ad9c13eed1f8138e4d700ff4e4e313> <http://xmlns.com/foaf/0.1/givenName> "Yifeng"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-07ad9c13eed1f8138e4d700ff4e4e313> <http://xmlns.com/foaf/0.1/familyName> "Xiong"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-07ad9c13eed1f8138e4d700ff4e4e313> <http://xmlns.com/foaf/0.1/name> "Yifeng Xiong"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3d337ff63e8b39a8949fa0b79967fe6f> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-3d337ff63e8b39a8949fa0b79967fe6f> <http://xmlns.com/foaf/0.1/givenName> "Fan"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3d337ff63e8b39a8949fa0b79967fe6f> <http://xmlns.com/foaf/0.1/familyName> "Liu"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3d337ff63e8b39a8949fa0b79967fe6f> <http://xmlns.com/foaf/0.1/name> "Fan Liu"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/WorkingPaperEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1717548> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1717548> <http://www.w3.org/2000/01/rdf-schema#label> "Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://eprints.org/ontology/hasAccepted> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1717548> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10189676/1/2401.16778.pdf> .
<https://discovery.ucl.ac.uk/id/document/1717548> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10189676/1/2401.16778.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/10189676/1/2401.16778.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "2401.16778.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1729096> .
<https://discovery.ucl.ac.uk/id/document/1729096> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1729096> <http://www.w3.org/2000/01/rdf-schema#label> "Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1729096> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729096> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729096> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729096> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10189676/2/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/document/1729096> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10189676/2/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/eprint/10189676/2/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1729097> .
<https://discovery.ucl.ac.uk/id/document/1729097> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1729097> <http://www.w3.org/2000/01/rdf-schema#label> "Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1729097> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729097> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729097> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729097> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10189676/3/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/document/1729097> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10189676/3/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10189676/3/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1729098> .
<https://discovery.ucl.ac.uk/id/document/1729098> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1729098> <http://www.w3.org/2000/01/rdf-schema#label> "Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1729098> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729098> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729098> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729098> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10189676/4/preview.jpg> .
<https://discovery.ucl.ac.uk/id/document/1729098> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10189676/4/preview.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10189676/4/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1729099> .
<https://discovery.ucl.ac.uk/id/document/1729099> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1729099> <http://www.w3.org/2000/01/rdf-schema#label> "Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1729099> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729099> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729099> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729099> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10189676/5/medium.jpg> .
<https://discovery.ucl.ac.uk/id/document/1729099> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10189676/5/medium.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10189676/5/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/1729100> .
<https://discovery.ucl.ac.uk/id/document/1729100> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/1729100> <http://www.w3.org/2000/01/rdf-schema#label> "Secure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/1729100> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729100> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729100> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/1717548> .
<https://discovery.ucl.ac.uk/id/document/1729100> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10189676/6/small.jpg> .
<https://discovery.ucl.ac.uk/id/document/1729100> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10189676/6/small.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10189676/6/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10189676> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10189676/> .
<https://discovery.ucl.ac.uk/id/eprint/10189676/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10189676 \n\nSecure ISAC MIMO Systems: Exploiting Interference With Bayesian Cramér-Rao Bound Optimization\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/10189676/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/10189676/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10189676> .