Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation
暂无分享,去创建一个
Li Sun | Yichen Wang | Pinyi Ren | Qinghe Du | Li Sun | Q. Du | Pinyi Ren | Yichen Wang
[1] Emanuele Viterbo,et al. Signal Space Diversity: A Power- and Bandwidth-Efficient Diversity Technique for the Rayleigh Fading Channel , 1998, IEEE Trans. Inf. Theory.
[2] Marco Chiani,et al. New exponential bounds and approximations for the computation of error probability in fading channels , 2003, IEEE Trans. Wirel. Commun..
[3] Mazen O. Hasna,et al. End-to-end performance of transmission systems with relays over Rayleigh-fading channels , 2003, IEEE Trans. Wirel. Commun..
[4] Aydin Behnad,et al. Upper bound for the performance metrics of amplify-and-forward cooperative networks based on harmonic mean approximation , 2011, 2011 18th International Conference on Telecommunications.
[5] Sungsoo Park,et al. Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.
[6] Olav Tirkkonen,et al. Device-to-Device underlay cellular network based on rate splitting , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[7] Mustafa Cenk Gursoy. Secure Communication in the Low-SNR Regime , 2012, IEEE Transactions on Communications.
[8] Nicola Laurenti,et al. Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.
[9] Xinbing Wang,et al. Cooperative relaying schemes for device-to-device communication underlaying cellular networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[10] Jorma Lilleberg,et al. Spectrum Sharing Scheme Between Cellular Users and Ad-hoc Device-to-Device Users , 2013, IEEE Transactions on Wireless Communications.
[11] An Wang,et al. Physical layer security for multiuser two-way relay using distributed auction game , 2013, 2013 IEEE Third International Conference on Information Science and Technology (ICIST).
[12] Andrea J. Goldsmith,et al. The Multiway Relay Channel , 2013, IEEE Transactions on Information Theory.
[13] Yiyang Pei,et al. Resource Allocation for Device-to-Device Communications Overlaying Two-Way Cellular Networks , 2013, IEEE Trans. Wirel. Commun..
[14] Wan Choi,et al. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.
[15] Wei Xu,et al. Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[16] Halim Yanikomeroglu,et al. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.
[17] Jun Huang,et al. Resource allocation for intercell device-to-device communication underlaying cellular network: A game-theoretic approach , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).
[18] Zhiguo Ding,et al. Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks , 2014, 2014 IEEE Global Communications Conference.
[19] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[20] Zhiguo Ding,et al. Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..
[21] Xiang Chen,et al. Joint Optimization of Resource Allocation and Relay Selection for Network Coding Aided Device-to-Device Communications , 2015, IEEE Communications Letters.
[22] Eduard A. Jorswieck,et al. Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward , 2014, IEEE Transactions on Information Forensics and Security.
[23] Ying Yin,et al. A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks , 2016, IEEE Transactions on Emerging Topics in Computing.