Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks
暂无分享,去创建一个
Lifeng Wang | Jinhong Yuan | Yansha Deng | Syed Ali Raza Zaidi | Maged Elkashlan | Lifeng Wang | M. Elkashlan | Jinhong Yuan | Yansha Deng
[1] A. Lee Swindlehurst,et al. Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[2] Ranjan K. Mallik,et al. Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.
[3] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[4] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[5] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[6] Santhanakrishnan Anand,et al. On the Secrecy Capacity of Fading Cognitive Wireless Networks , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[7] Ranjan K. Mallik,et al. Impact of Primary Network on Secondary Network With Generalized Selection Combining , 2015, IEEE Transactions on Vehicular Technology.
[8] Lifeng Wang,et al. Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[9] Jeffrey G. Andrews,et al. Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.
[10] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[11] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
[12] T. Mattfeldt. Stochastic Geometry and Its Applications , 1996 .
[13] J. G. Wendel. The Non-Absolute Convergence of Gil-Pelaez' Inversion Integral , 1961 .
[14] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[15] François Baccelli,et al. An Aloha protocol for multihop mobile wireless networks , 2006, IEEE Transactions on Information Theory.
[16] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[17] WangChao,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014 .
[18] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[19] Jeffrey G. Andrews,et al. Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.
[20] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[21] Xuemin Shen,et al. Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.
[22] Mounir Ghogho,et al. Breaking the Area Spectral Efficiency Wall in Cognitive Underlay Networks , 2014, IEEE Journal on Selected Areas in Communications.
[23] M. Haenggi,et al. Shot Noise Models for Outage and Throughput Analyses in Wireless Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[24] Huiming Wang,et al. On Transmission Secrecy Outage of a Multi-Antenna System With Randomly Located Eavesdroppers , 2014, IEEE Communications Letters.
[25] Erik G. Larsson,et al. Uplink Performance Analysis of Multicell MU-SIMO Systems With ZF Receivers , 2012, IEEE Transactions on Vehicular Technology.
[26] Martin Haenggi,et al. Stochastic Geometry for Modeling, Analysis, and Design of Multi-Tier and Cognitive Cellular Wireless Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[27] Donald F. Towsley,et al. Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.
[28] Ranjan K. Mallik,et al. Cognitive MIMO Relay Networks With Generalized Selection Combining , 2014, IEEE Transactions on Wireless Communications.
[29] Lifeng Wang,et al. Generalized Selection Combining for Cognitive Relay Networks Over Nakagami-$m$ Fading , 2015, IEEE Transactions on Signal Processing.
[30] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[31] Huiming Wang,et al. Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.
[32] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[33] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[34] Andrea J. Goldsmith,et al. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.
[35] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[36] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[37] Jamie S. Evans,et al. Secrecy rate maximization for cooperative overlay cognitive radio networks with artificial noise , 2014, 2014 IEEE International Conference on Communications (ICC).
[38] Lifeng Wang,et al. On the security of large scale spectrum sharing networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[39] Matthew R. McKay,et al. Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.
[40] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[41] Aylin Yener,et al. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.
[42] Xiangyun Zhou,et al. Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.
[43] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[44] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[45] BaccelliFrançois,et al. Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009 .
[46] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[47] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[48] Fading. Generalized Selection Combining for Cognitive Relay Networks over Nakagami-m Fading , 2015 .