Resource allocation for physical layer security in heterogeneous network with hidden eavesdropper
暂无分享,去创建一个
Kuang Jingming | Fei Zesong | Xing Chengwen | Gong Shiqi | Zesong Fei | Jingming Kuang | C. Xing | Gong Shiqi
[1] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.
[2] Wang Li,et al. Security-oriented transmission based on cooperative relays in cognitive radio , 2013, China Communications.
[3] Il-Min Kim,et al. Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.
[4] Zhenfu Cao,et al. Survey of information security , 2007, Science in China Series F: Information Sciences.
[5] Jinhong Yuan,et al. Location-Based Secure Transmission for Wiretap Channels , 2015, IEEE Journal on Selected Areas in Communications.
[6] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[7] Qiang Liu,et al. Acquisition of channel state information in heterogeneous cloud radio access networks: challenges and research directions , 2015, IEEE Wireless Communications.
[8] Hao Yu,et al. Improved Computation for Levenberg–Marquardt Training , 2010, IEEE Transactions on Neural Networks.
[9] Stephen P. Boyd,et al. Optimal power control in interference-limited fading wireless channels with outage-probability specifications , 2002, IEEE Trans. Wirel. Commun..
[10] H. Vincent Poor,et al. Contract-Based Interference Coordination in Heterogeneous Cloud Radio Access Networks , 2015, IEEE Journal on Selected Areas in Communications.
[11] Huiming Wang,et al. Improving the Physical-Layer Security of Wireless Two-Way Relaying via Analog Network Coding , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[12] Xinrong Li,et al. RSS-Based Location Estimation with Unknown Pathloss Model , 2006, IEEE Transactions on Wireless Communications.
[13] R. Kass. Nonlinear Regression Analysis and its Applications , 1990 .
[14] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[15] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[16] Chengwen Xing,et al. Matrix-Monotonic Optimization for MIMO Systems , 2013, IEEE Transactions on Signal Processing.
[17] Keping Long,et al. Self-organization paradigms and optimization approaches for cognitive radio technologies: a survey , 2013, IEEE Wireless Communications.
[18] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..