Reliability-Intercept Gap Analysis of Underlay Cognitive Networks Under Artificial Noise and Primary Interference
暂无分享,去创建一个
[1] Behrouz Maham,et al. Cooperative Sensing With Joint Energy and Correlation Detection in Cognitive Radio Networks , 2017, IEEE Communications Letters.
[2] Donatella Darsena,et al. An Opportunistic Spectrum Access Scheme for Multicarrier Cognitive Sensor Networks , 2017, IEEE Sensors Journal.
[3] Zhiyong Feng,et al. A survey of security issues in Cognitive Radio Networks , 2015 .
[4] Xiangyun Zhou,et al. Artificial-Noise-Aided Secure Transmission Scheme With Limited Training and Feedback Overhead , 2017, IEEE Transactions on Wireless Communications.
[5] Yulong Zou,et al. Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.
[6] Chen Gang,et al. A SDN-based energy saving strategy in wireless access networks , 2015, China Communications.
[7] Liuqing Yang,et al. Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.
[8] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[9] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[10] Yueming Cai,et al. Secure transmission in the random cognitive radio networks with secrecy guard zone and artificial noise , 2016, IET Commun..
[11] Shantanu Sharma,et al. A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..
[12] Tharmalingam Ratnarajah,et al. On the security of cognitive radio networks: Cooperative jamming with relay selection , 2014, 2014 European Conference on Networks and Communications (EuCNC).
[13] Wei Zhong,et al. AN-Aided Secrecy Precoding for SWIPT in Cognitive MIMO Broadcast Channels , 2015, IEEE Communications Letters.
[14] Shlomo Shamai,et al. Fading Channels: Information-Theoretic and Communication Aspects , 1998, IEEE Trans. Inf. Theory.
[15] Li Guo,et al. Secure cognitive radio system with cooperative secondary networks , 2015, 2015 22nd International Conference on Telecommunications (ICT).
[16] Xing Zhang,et al. Secure transmission via jamming in cognitive radio networks with possion spatially distributed eavesdroppers , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[17] Xiuzhen Cheng,et al. Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[18] Mohammad Ali Khojastepour,et al. Outage minimization and optimal power control for the fading relay channel , 2004, Information Theory Workshop.
[19] Khuong Ho-Van. Exact outage probability analysis of proactive relay selection in cognitive radio networks with MRC receivers , 2016, Journal of Communications and Networks.
[20] Huawei Chen,et al. QoS-based beamforming with cooperative jamming in Cognitive Radio Networks , 2013, 2013 International Conference on Communications, Circuits and Systems (ICCCAS).
[21] Paschalis C. Sofotasios,et al. Underlay cooperative cognitive networks with imperfect Nakagami-m fading channel information and strict transmit power constraint: Interference statistics and outage probability analysis , 2014, Journal of Communications and Networks.
[22] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[23] Wei Zhong,et al. Precoding and Artificial Noise Design for Cognitive MIMOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[24] Xianfu Chen,et al. Secure beamforming for cognitive radio networks with artificial noise , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[25] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[26] Li Sun,et al. Cooperative Relaying and Jamming for Primary Secure Communication in Cognitive Two-Way Networks , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).
[27] Octavia A. Dobre,et al. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[28] Tharmalingam Ratnarajah,et al. Securing cognitive radio with a combined approach of beamforming and cooperative jamming , 2017, IET Commun..
[29] Hui-Ming Wang,et al. Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.
[30] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .