Performance Analysis of a Cache-Aided Wireless Heterogeneous Network With Secrecy Constraints
暂无分享,去创建一个
[1] Donatella Darsena,et al. Convolutive Superposition for Multicarrier Cognitive Radio Systems , 2016, IEEE Journal on Selected Areas in Communications.
[2] Suhas N. Diggavi,et al. Rate and delay for coded caching with carrier aggregation , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[3] Mehdi Bennis,et al. Living on the edge: The role of proactive caching in 5G wireless networks , 2014, IEEE Communications Magazine.
[4] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[5] H. Vincent Poor,et al. Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization , 2011, IEEE Transactions on Information Forensics and Security.
[6] Tony Q. S. Quek,et al. Cooperative Caching and Transmission Design in Cluster-Centric Small Cell Networks , 2016, IEEE Transactions on Wireless Communications.
[7] Zheng Chen,et al. Wireless Caching Helper System with Heterogeneous Traffic and Secrecy Constraints , 2019, 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[8] Tony Q. S. Quek,et al. Secure Communications for the Two-User Broadcast Channel With Random Traffic , 2018, IEEE Transactions on Information Forensics and Security.
[9] Amos Lapidoth,et al. The Gaussian watermarking game , 2000, IEEE Trans. Inf. Theory.
[10] Zheng Chen,et al. Probabilistic Caching in Wireless D2D Networks: Cache Hit Optimal Versus Throughput Optimal , 2016, IEEE Communications Letters.
[11] Alexandros G. Dimakis,et al. Scaling Behavior for Device-to-Device Communications With Distributed Caching , 2014, IEEE Transactions on Information Theory.
[12] Anthony Ephremides,et al. Stable Throughput Region of the Two-User Broadcast Channel , 2016, IEEE Transactions on Communications.
[13] Yue Wang,et al. Joint Caching Placement and User Association for Minimizing User Download Delay , 2016, IEEE Access.
[14] Ling Luo,et al. Caching-Aided Physical Layer Security in Wireless Cache-Enabled Heterogeneous Networks , 2018, IEEE Access.
[15] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[16] Moe Z. Win,et al. Distributed Network Secrecy , 2013, IEEE Journal on Selected Areas in Communications.
[17] Yingbin Liang,et al. Wireless broadcast networks: Reliability, security, and stability , 2008, 2008 Information Theory and Applications Workshop.
[18] Zhen Li,et al. Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[19] Anna Scaglione,et al. An Amplify-and-Forward Scheme for Spectrum Sharing in Cognitive Radio Channels , 2015, IEEE Transactions on Wireless Communications.
[20] Sennur Ulukus,et al. Effects of cooperation on the secrecy of multiple access channels with generalized feedback , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[21] Zheng Chen,et al. Throughput and Delay Analysis of Wireless Caching Helper Systems With Random Availability , 2017, IEEE Access.
[22] Alexandros G. Dimakis,et al. FemtoCaching: Wireless Content Delivery Through Distributed Caching Helpers , 2013, IEEE Transactions on Information Theory.
[23] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[24] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[25] Xiangyun Zhou,et al. On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels , 2016, IEEE Transactions on Wireless Communications.
[26] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[27] Sennur Ulukus,et al. Secrecy in Cooperative Relay Broadcast Channels , 2008, IEEE Transactions on Information Theory.
[28] Qian Yang,et al. Delivery-Secrecy Tradeoff for Cache-Enabled Stochastic Networks: Content Placement Optimization , 2018, IEEE Transactions on Vehicular Technology.
[29] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[30] K. J. Ray Liu,et al. Cognitive multiple access via cooperation: Protocol design and performance analysis , 2007, IEEE Transactions on Information Theory.
[31] Joy Kuri,et al. Joint scheduling & jamming for data secrecy in wireless networks , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).
[32] Babak Hossein Khalaj,et al. Stability, Rate, and Delay Analysis of Single Bottleneck Caching Networks , 2016, IEEE Transactions on Communications.
[33] Dongqing Xie,et al. Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks , 2018, IEEE Access.