Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks
暂无分享,去创建一个
[1] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[2] Victor C. M. Leung,et al. Exploiting Opportunistic Scheduling in Uplink Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.
[3] Huaiyu Dai,et al. Asymptotic Analysis on the Interaction Between Spatial Diversity and Multiuser Diversity in Wireless Networks , 2007, IEEE Transactions on Signal Processing.
[4] Yang Yu,et al. IEEE 802.16J relay-based wireless access networks: an overview , 2008, IEEE Wireless Communications.
[5] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[6] Huiming Wang,et al. Secure Communication in Uplink Transmissions: User Selection and Multiuser Secrecy Gain , 2016, IEEE Transactions on Communications.
[7] I. Miller. Probability, Random Variables, and Stochastic Processes , 1966 .
[8] Ying-Chang Liang,et al. Optimal Relay Selection in IEEE 802.16j Multihop Relay Vehicular Networks , 2010, IEEE Transactions on Vehicular Technology.
[9] Hamid-Reza Bahrami,et al. On the Feedback Reduction of Multiuser Relay Networks Using Compressive Sensing , 2016, IEEE Transactions on Communications.
[10] Daesik Hong,et al. A new asymptotic analysis of throughput enhancement from selection diversity using a high SNR approach in multiuser systems , 2009, IEEE Trans. Wirel. Commun..
[11] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[12] Xuemin Shen,et al. Relay selection and resource allocation for multi-user cooperative LTE-A uplink , 2012, 2012 IEEE International Conference on Communications (ICC).
[13] Andreas F. Molisch,et al. Applying Antenna Selection in WLANs for Achieving Broadband Multimedia Communications , 2006, IEEE Transactions on Broadcasting.
[14] Daniel Benevides da Costa,et al. A New Efficient Low-Complexity Scheme for Multi-Source Multi-Relay Cooperative Networks , 2011, IEEE Transactions on Vehicular Technology.
[15] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[16] Hong Man,et al. Maximal Ratio Diversity Combining Enhanced Security , 2011, IEEE Communications Letters.
[17] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[18] Nan Yang,et al. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming , 2016, Sensors.
[19] Trung Quang Duong,et al. Secure Multiuser Scheduling in Downlink Dual-Hop Regenerative Relay Networks Over Nakagami- $m$ Fading Channels , 2016, IEEE Transactions on Wireless Communications.
[20] Rafael F. Schaefer,et al. Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.
[21] Trung Quang Duong,et al. On the performance of selection decode-and-forward relay networks over Nakagami-m fading channels , 2009, IEEE Communications Letters.
[22] M. Yuksel,et al. Secure Communication with a Relay Helping the Wire-tapper , 2007, 2007 IEEE Information Theory Workshop.
[23] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[24] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.
[25] D. F. Hays,et al. Table of Integrals, Series, and Products , 1966 .
[26] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[27] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[28] Daniel Benevides da Costa,et al. Spectrally Efficient Diversity Exploitation Schemes for Downlink Cooperative Cellular Networks , 2012, IEEE Transactions on Vehicular Technology.
[29] Jesus Gomez Galvan,et al. Channel Inversion CoMP Technique in Cellular System A User-Selection Algorithm , 2014, ICWMC 2014.
[30] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[31] Robert Schober,et al. Diversity Analysis of Multi-User Multi-Relay Networks , 2011, IEEE Transactions on Wireless Communications.
[32] Mérouane Debbah,et al. Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[33] George K. Karagiannidis,et al. Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.
[34] Xiaoming Chen,et al. On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI , 2014, 2014 IEEE International Conference on Communications (ICC).
[35] Mohamed-Slim Alouini,et al. Security and reliability analysis of diversity combining techniques in SIMO mixed RF/FSO with multiple users , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[36] Mohamed-Slim Alouini,et al. Adaptive modulation with best user selection over non-identical Nakagami fading channels , 2011, 2011 8th International Symposium on Wireless Communication Systems.
[37] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[38] Maria Huhtala,et al. Random Variables and Stochastic Processes , 2021, Matrix and Tensor Decompositions in Signal Processing.
[39] Pingzhi Fan,et al. Secure multiuser communications in multiple decode-and-forward relay networks with direct links , 2014, 2014 IEEE Global Communications Conference.