Secure Communication for Millimeter-Wave Systems with Randomly Located Non-Colluding Eavesdroppers
暂无分享,去创建一个
[1] Jeffrey G. Andrews,et al. Tractable Model for Rate in Self-Backhauled Millimeter Wave Cellular Networks , 2014, IEEE Journal on Selected Areas in Communications.
[2] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[3] Lajos Hanzo,et al. Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments , 2019, IEEE Access.
[4] Tharmalingam Ratnarajah,et al. An analysis on relay assisted millimeter wave networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[5] Weiwei Yang,et al. Secrecy Performance Analysis on Relay-Assisted Millimeter Wave Networks , 2018, 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP).
[6] Tao Zhang,et al. Secure Communication in Millimeter Wave Relaying Networks , 2019, IEEE Access.
[7] Hai Jiang,et al. Two-Way Relay Selection for Millimeter Wave Networks , 2018, IEEE Communications Letters.
[8] Tharmalingam Ratnarajah,et al. On the Performance of Relay Aided Millimeter Wave Networks , 2016, IEEE Journal of Selected Topics in Signal Processing.
[9] Robert W. Heath,et al. Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.
[10] Qinye Yin,et al. Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers , 2018, IEEE Transactions on Wireless Communications.
[11] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[12] Norman C. Beaulieu,et al. Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks , 2019, IEEE Transactions on Communications.
[13] Li Sun,et al. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.
[14] Abbas Mohammadi,et al. Characterization of untrusted relaying networks in the presence of an adversary jammer , 2019, Wireless Networks.
[15] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[16] Theodore S. Rappaport,et al. Millimeter Wave Channel Modeling and Cellular Capacity Evaluation , 2013, IEEE Journal on Selected Areas in Communications.
[17] Derrick Wing Kwan Ng,et al. Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.
[18] Ali Kuhestani,et al. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[19] Sayed Mostafa Safavi Hemami,et al. Secure transmission in large-scale cooperative millimetre-wave systems with passive eavesdroppers , 2020, IET Commun..
[20] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.