Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks
暂无分享,去创建一个
Zhi Chen | Yu Gong | Gaojie Chen | Jonathon A. Chambers | Zhao Tian | J. Chambers | Gaojie Chen | Zhao Tian | Yu Gong | Zhi Chen
[1] D. Vere-Jones. Markov Chains , 1972, Nature.
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[4] H. A. David,et al. Order Statistics (2nd ed). , 1981 .
[5] G. A. Mack,et al. Order Statistics (2nd Ed.) , 1983 .
[6] Robert J. Plemmons,et al. Nonnegative Matrices in the Mathematical Sciences , 1979, Classics in Applied Mathematics.
[7] Charles M. Grinstead,et al. Introduction to probability , 1999, Statistics for the Behavioural Sciences.
[8] John N. Tsitsiklis,et al. Introduction to Probability , 2002 .
[9] Imre Csiszár,et al. Secrecy Capacities for Multiterminal Channel Models , 2005, IEEE Transactions on Information Theory.
[10] Aggelos Bletsas,et al. A simple Cooperative diversity method based on network path selection , 2005, IEEE Journal on Selected Areas in Communications.
[11] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[12] H. Vincent Poor,et al. Recovering Multiplexing Loss through Successive Relaying Using Repetition Coding , 2007, IEEE Transactions on Wireless Communications.
[13] Ender Tekin,et al. The Gaussian multiple access wire-tap channel: wireless secrecy and cooperative jamming , 2007, 2007 Information Theory and Applications Workshop.
[14] Wei Zhang,et al. Power Control in Cognitive Radio Systems Based on Spectrum Sensing Side Information , 2007, 2007 IEEE International Conference on Communications.
[15] Amir Ghasemi,et al. Fundamental limits of spectrum-sharing in fading environments , 2007, IEEE Transactions on Wireless Communications.
[16] Michele Nogueira Lima,et al. Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.
[17] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[18] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[19] Song Rong-fang. An Improved Cooperative Diversity Method Based on Network Path Selection , 2008 .
[20] H. Poor,et al. Buffering in a Three-Node Relay Network (Part 2) , 2008 .
[21] Zhu Han,et al. Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[22] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[23] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[24] H. Vincent Poor,et al. Buffering in a Three-Node Relay Network , 2008, IEEE Transactions on Wireless Communications.
[25] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[26] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[27] Tharmalingam Ratnarajah,et al. On the Performance of Opportunistic Cooperative Wireless Networks , 2008, IEEE Transactions on Communications.
[28] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[29] Zhu Han,et al. Amplify-and-forward based cooperation for secure wireless communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[30] Petar Popovski,et al. Wireless Secrecy in Cellular Systems With Infrastructure-Aided Cooperation , 2009, IEEE Transactions on Information Forensics and Security.
[31] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[32] Joseph Lipka,et al. A Table of Integrals , 2010 .
[33] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[34] Herbert A. David,et al. Order Statistics , 2011, International Encyclopedia of Statistical Science.
[35] David Gesbert,et al. Efficient Selective Feedback Design for Multicell Cooperative Networks , 2011, IEEE Transactions on Vehicular Technology.
[36] Lutz H.-J. Lampe,et al. Buffer-aided relaying in a three node network , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[37] John S. Thompson,et al. Buffer-Aided Relay Selection for Cooperative Diversity Systems without Delay Constraints , 2012, IEEE Transactions on Wireless Communications.
[38] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.
[39] John S. Thompson,et al. Comment on "Relay Selection for Secure Cooperative Networks with Jamming" , 2012, IEEE Transactions on Wireless Communications.
[40] Zhiguo Ding,et al. A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.
[41] Robert Schober,et al. Max-Max Relay Selection for Relays with Buffers , 2012, IEEE Transactions on Wireless Communications.
[42] Robert Schober,et al. Buffer-Aided Relaying with Adaptive Link Selection , 2012, IEEE Journal on Selected Areas in Communications.
[43] Huaping Liu,et al. Sum-Rate Optimization in a Two-Way Relay Network with Buffering , 2012, IEEE Communications Letters.
[44] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .