Proactive Eavesdropping of Suspicious Non-Orthogonal Multiple Access Networks
暂无分享,去创建一个
[1] Pinyi Ren,et al. Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis , 2019, IEEE Transactions on Information Forensics and Security.
[2] Ding Xu,et al. Legitimate Surveillance With Battery-Aided Wireless Powered Full-Duplex Monitor , 2020, IEEE Systems Journal.
[3] Yuanwei Liu,et al. Physical Layer Security in Uplink NOMA Multi-Antenna Systems With Randomly Distributed Eavesdroppers , 2017, IEEE Access.
[4] Rui Zhang,et al. Jamming-Assisted Proactive Eavesdropping Over Two Suspicious Communication Links , 2019, IEEE Transactions on Wireless Communications.
[5] Ding Xu,et al. Jamming-Assisted Legitimate Surveillance of Suspicious Interference Networks With Successive Interference Cancellation , 2020, IEEE Communications Letters.
[6] Ding Xu,et al. Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users , 2020, IEEE Communications Letters.
[7] Caijun Zhong,et al. Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.
[8] H. Vincent Poor,et al. Secure Relaying in Non-Orthogonal Multiple Access: Trusted and Untrusted Scenarios , 2018, IEEE Transactions on Information Forensics and Security.
[10] Chong Li,et al. Dynamic Resource Allocation for Transmit Power Minimization in OFDM-Based NOMA Systems , 2016, IEEE Communications Letters.
[11] He Chen,et al. Wireless Information Surveillance and Intervention Over Multiple Suspicious Links , 2018, IEEE Signal Processing Letters.
[12] Jie Xu,et al. Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.
[13] Baoyun Wang,et al. Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems , 2019, IEEE Transactions on Vehicular Technology.
[14] Kun Lu,et al. A Survey of Non-Orthogonal Multiple Access for 5G , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[15] Robert W. Heath,et al. Performance analysis of maximum ratio combining with imperfect channel estimation in the presence of cochannel interferences , 2009, IEEE Transactions on Wireless Communications.
[16] H. Vincent Poor,et al. Non-Orthogonal Multiple Access: Common Myths and Critical Questions , 2018, IEEE Wireless Communications.
[17] Haijun Zhang,et al. Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links , 2019, IEEE Transactions on Vehicular Technology.
[18] Victor C. M. Leung,et al. Energy-Efficient Resource Allocation in NOMA Heterogeneous Networks , 2018, IEEE Wireless Communications.
[19] Jie Xu,et al. Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.