Proactive Eavesdropping in Underlaid D2D Communication Networks
暂无分享,去创建一个
Xiaodong Ji | Ye Li | Shibing Zhang | Zhihua Bao | Jun Zhu | Yingdong Hu | Ruifeng Gao | Zhihua Bao | Shibing Zhang | Ye Li | Yingdong Hu | Jun Zhu | Ruifeng Gao | Xiaodong Ji
[1] YANG CAO,et al. Cooperative device-to-device communications in cellular networks , 2015, IEEE Wireless Communications.
[2] Pei Li,et al. Proactive Eavesdropping via Jamming in Cognitive Radio Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[3] Caijun Zhong,et al. Performance of Proactive Eavesdropping in Dual-Hop Relaying Systems , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).
[4] Caijun Zhong,et al. Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.
[5] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[6] Qi Zhang,et al. Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.
[7] Caijun Zhong,et al. Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.
[8] Risto Wichman,et al. In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.
[9] Jie Xu,et al. Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.
[10] MohammadAli Mohammadi,et al. Proactive Eavesdropping via Jamming in Full-duplex Cellular Networks with Antenna Selection , 2018, 2018 9th International Symposium on Telecommunications (IST).
[11] Rui Zhang,et al. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.
[12] Jie Xu,et al. Proactive Eavesdropping via Jamming over HARQ-Based Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[13] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.
[14] Chong-Yung Chi,et al. Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.
[15] William W. Hager,et al. Updating the Inverse of a Matrix , 1989, SIAM Rev..
[16] Nikos D. Sidiropoulos,et al. Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.
[17] Jie Xu,et al. Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.