Secrecy Analysis of Distributed CDD-Based Cooperative Systems With Deliberate Interference
暂无分享,去创建一个
H. Vincent Poor | Marco Di Renzo | Hongwu Liu | Kyeong Jin Kim | Philip V. Orlik | H. Poor | K. Kim | Hongwu Liu | M. Di Renzo | P. Orlik
[1] Luc Vandendorpe,et al. On secure transmission over parallel relay eavesdropper channel , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[2] H. Vincent Poor,et al. Secrecy Performance of Finite-Sized Cooperative Single Carrier Systems With Unreliable Backhaul Connections , 2016, IEEE Transactions on Signal Processing.
[3] Dong Wang,et al. Asynchronous Cooperative Communications with STBC Coded Single Carrier Block Transmission , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[4] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[5] Luc Deneire,et al. Training sequence versus cyclic prefix-a new look on single carrier communication , 2001, IEEE Communications Letters.
[6] George K. Karagiannidis,et al. Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.
[7] Yonghong Zeng,et al. Pilot cyclic prefixed single carrier communication: channel estimation and equalization , 2005, IEEE Signal Processing Letters.
[8] Kyeong Jin Kim,et al. Performance Analysis of Cooperative Systems With Unreliable Backhauls and Selection Combining , 2017, IEEE Transactions on Vehicular Technology.
[9] Jiri Blumenstein,et al. Coarse Time Synchronization Utilizing Symmetric Properties of Zadoff–Chu Sequences , 2018, IEEE Communications Letters.
[10] Yulong Zou,et al. Physical-Layer Security for Spectrum Sharing Systems , 2016, IEEE Transactions on Wireless Communications.
[11] Keith Q. T. Zhang,et al. Outage performance for maximal ratio combiner in the presence of unequal-power co-channel interferers , 2004, IEEE Communications Letters.
[12] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[13] Jaehoon Jung,et al. Zadoff-Chu Sequence Based Signature Identification for OFDM , 2013, IEEE Transactions on Wireless Communications.
[14] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[15] Toshiaki Miyazaki,et al. Antieavesdropping With Selfish Jamming in Wireless Networks: A Bertrand Game Approach , 2017, IEEE Transactions on Vehicular Technology.
[16] H. Vincent Poor,et al. Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.
[17] Luc Vandendorpe,et al. Multiaccess Channel With Partially Cooperating Encoders and Security Constraints , 2012, IEEE Transactions on Information Forensics and Security.
[18] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[19] Pingzhi Fan,et al. Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise , 2014, IEEE Transactions on Wireless Communications.
[20] 최준일. Explicit vs. Implicit Feedback for SU and MU-MIMO , 2010 .
[21] Roy D. Yates,et al. Secrecy capacity of independent parallel channels , 2009 .
[22] Nikos C. Sagias,et al. Physical Layer Security for Multiple-Antenna Systems: A Unified Approach , 2016, IEEE Transactions on Communications.
[23] Luc Vandendorpe,et al. Secure Communication Over Parallel Relay Channel , 2010, IEEE Transactions on Information Forensics and Security.
[24] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[25] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[26] Tomohiro Hase,et al. Improvement on the Channel Estimation of Pilot Cyclic Prefixed Single Carrier (PCP-SC) System , 2009, 2009 IEEE 70th Vehicular Technology Conference Fall.
[27] H. Vincent Poor,et al. Performance Analysis of Distributed Single Carrier Systems With Distributed Cyclic Delay Diversity , 2017, IEEE Transactions on Communications.
[28] Il-Min Kim,et al. Secure Transmission for Multiuser Relay Networks , 2015, IEEE Transactions on Wireless Communications.
[29] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[30] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[31] Qimei Cui,et al. Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.
[32] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[33] H. Vincent Poor,et al. Secrecy Performance Analysis of Distributed CDD Based Cooperative Systems with Jamming , 2018, 2018 IEEE International Conference on Communications (ICC).
[34] T.K.Y. Lo,et al. Maximum ratio transmission , 1999, 1999 IEEE International Conference on Communications (Cat. No. 99CH36311).
[35] Caijun Zhong,et al. Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.
[36] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[37] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..