Secure Communication in Millimeter Wave Relaying Networks
暂无分享,去创建一个
[1] Ming Xiao,et al. Millimeter Wave Communications for Future Mobile Networks , 2017, IEEE Journal on Selected Areas in Communications.
[2] Pinyi Ren,et al. Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.
[3] Yueming Cai,et al. Physical Layer Security in Cognitive Untrusted Relay Networks , 2018, IEEE Access.
[4] Theodore S. Rappaport,et al. Millimeter Wave Channel Modeling and Cellular Capacity Evaluation , 2013, IEEE Journal on Selected Areas in Communications.
[5] Meixia Tao,et al. Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.
[6] Xiangyun Zhou,et al. Secure Transmission in Linear Multihop Relaying Networks , 2017, IEEE Transactions on Wireless Communications.
[7] Yongming Huang,et al. Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems With Outdated CSI , 2018, IEEE Transactions on Communications.
[8] Wenquan Feng,et al. Outage Performance of Relaying with Directional Antennas in the Presence of Co-Channel Interferences at Relays , 2012, IEEE Wireless Communications Letters.
[9] Tharmalingam Ratnarajah,et al. On the Performance of mmWave Networks Aided by Wirelessly Powered Relays , 2016, IEEE Journal of Selected Topics in Signal Processing.
[10] Robert W. Heath,et al. Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.
[11] Jeffrey G. Andrews,et al. Modeling and Analyzing Millimeter Wave Cellular Systems , 2016, IEEE Transactions on Communications.
[12] Ward Whitt,et al. Numerical Inversion of Laplace Transforms of Probability Distributions , 1995, INFORMS J. Comput..
[13] C. O'Cinneide. Euler summation for fourier series and laplace transform inversion , 1997 .
[14] Xu Zhu,et al. Energy-Efficiency of Millimeter-Wave Full-Duplex Relaying Systems: Challenges and Solutions , 2016, IEEE Access.
[15] Huiming Wang,et al. Physical Layer Security in Millimeter Wave Cellular Networks , 2016, IEEE Transactions on Wireless Communications.
[16] Yueming Cai,et al. Secure Connectivity Using Randomize-and-Forward Strategy in Cooperative Wireless Networks , 2013, IEEE Communications Letters.
[17] Hai Jiang,et al. Two-Way Relay Selection for Millimeter Wave Networks , 2018, IEEE Communications Letters.
[18] Hai Jiang,et al. Coverage Analysis of Millimeter Wave Decode-and-Forward Networks With Best Relay Selection , 2018, IEEE Access.
[19] Jinhong Yuan,et al. Artificial-Noise-Aided Transmission in Multi-Antenna Relay Wiretap Channels With Spatially Random Eavesdroppers , 2015, IEEE Transactions on Wireless Communications.
[20] George K. Karagiannidis,et al. Outage Probability and Optimal Cache Placement for Multiple Amplify-and-Forward Relay Networks , 2018, IEEE Transactions on Vehicular Technology.
[21] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[22] Weiwei Yang,et al. Secrecy Performance Analysis on Relay-Assisted Millimeter Wave Networks , 2018, 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP).
[23] George K. Karagiannidis,et al. Distributed Secure Switch-and-Stay Combining Over Correlated Fading Channels , 2019, IEEE Transactions on Information Forensics and Security.
[24] Naofal Al-Dhahir,et al. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System , 2016, IEEE Communications Letters.
[25] Tharmalingam Ratnarajah,et al. An Analysis on Secure Communication in Millimeter/Micro-Wave Hybrid Networks , 2016, IEEE Transactions on Communications.
[26] Chengwen Xing,et al. Millimeter-Wave Secrecy Beamforming Designs for Two-Way Amplify-and-Forward MIMO Relaying Networks , 2017, IEEE Transactions on Vehicular Technology.
[27] Ming Xiao,et al. Performance Analysis of Millimeter-Wave Relaying: Impacts of Beamwidth and Self-Interference , 2017, IEEE Transactions on Communications.
[28] Jeffrey G. Andrews,et al. Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.
[29] Xiangyun Zhou,et al. When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.
[30] Yu-Cheng He,et al. Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami- $m$ Fading Channels , 2017, IEEE Transactions on Communications.
[31] Chao Li,et al. Protecting Secure Communication Under UAV Smart Attack With Imperfect Channel Estimation , 2018, IEEE Access.
[32] Bei Xie,et al. Performance Study on Relay-Assisted Millimeter Wave Cellular Networks , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).
[33] Yueming Cai,et al. A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.
[34] Jeffrey G. Andrews,et al. Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.
[35] Georges Kaddoum,et al. On the Physical Layer Security Analysis of Hybrid Millimeter Wave Networks , 2018, IEEE Transactions on Communications.
[36] Stefano Tomasin,et al. Beamforming and Scheduling for mmWave Downlink Sparse Virtual Channels with Non-Orthogonal and Orthogonal Multiple Access , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[37] Yongming Huang,et al. Ergodic Achievable Secrecy Rate of Multiple-Antenna Relay Systems With Cooperative Jamming , 2016, IEEE Transactions on Wireless Communications.