A Location Prediction-Based Helper Selection Scheme for Suspicious Eavesdroppers
暂无分享,去创建一个
Chunqiang Hu | Yuqi Tian | Tao Jing | Yan Huo | Qinghe Gao
[1] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[2] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[3] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[4] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[5] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[6] Inkyu Lee,et al. Outage Constrained Robust Beamforming for Secure Broadcasting Systems With Energy Harvesting , 2016, IEEE Transactions on Wireless Communications.
[7] Jiguo Yu,et al. Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks , 2017, IEEE Transactions on Vehicular Technology.
[8] Zhen Li,et al. ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel , 2017, IEEE Access.
[9] Zhipeng Cai,et al. FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.
[10] Chunqiang Hu,et al. A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers , 2017, WASA.
[11] Lajos Hanzo,et al. Joint Secure AF Relaying and Artificial Noise Optimization: A Penalized Difference-of-Convex Programming Framework , 2016, IEEE Access.
[12] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[13] Xiuzhen Cheng,et al. Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[14] Xuemin Shen,et al. Cooperative networking towards secure communications for CRNs , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[15] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[16] Abdelhamid Mellouk,et al. Markov-History Based Modeling for Realistic Mobility of Vehicles in VANETs , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).
[17] Zhen Li,et al. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.
[18] Ashish Khisti,et al. Artificial-Noise Alignment for Secure Multicast using Multiple Antennas , 2012, IEEE Communications Letters.
[19] Kai-Kit Wong,et al. Secrecy Performance Analysis for TAS-MRC System With Imperfect Feedback , 2015, IEEE Transactions on Information Forensics and Security.
[20] Feng Liu,et al. Secrecy signal and artificial noise designs in cellular network , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[21] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[22] Jianzhong Li,et al. Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[23] Feng Liu,et al. Power Allocation and Jammer Selection of a Cooperative Jamming Strategy for Physical-Layer Security , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).
[24] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[25] Sungwook Kim. Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications , 2015, KSII Trans. Internet Inf. Syst..
[26] Qiang Li,et al. Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.
[27] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[28] Salvatore Marano,et al. Mobility prediction and resource reservation in cellular networks with distributed Markov chains , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[29] V. Janaki,et al. Secure and Efficient Data Communication Protocol for Wireless Body Area Networks , 2017 .
[30] Tony Q. S. Quek,et al. Jamming-Aided Secure Communication in Massive MIMO Rician Channels , 2015, IEEE Transactions on Wireless Communications.