Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective
暂无分享,去创建一个
Xiaohong Jiang | Yulong Shen | Shoji Kasahara | Yuanyu Zhang | Xiaohong Jiang | Yulong Shen | Yuanyu Zhang | S. Kasahara
[1] Minho Jo,et al. Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing , 2015, IEEE Wireless Communications.
[2] Xiaohong Jiang,et al. On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.
[3] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[4] Xiang Cheng,et al. Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.
[5] Robert W. Heath,et al. Five disruptive technology directions for 5G , 2013, IEEE Communications Magazine.
[6] Halim Yanikomeroglu,et al. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.
[7] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[8] Trung Q. Duong,et al. Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model , 2016, IEEE Transactions on Communications.
[9] Xuelong Li,et al. Secrecy-Optimized Resource Allocation for Device-to-Device Communication Underlaying Heterogeneous Networks , 2017, IEEE Transactions on Vehicular Technology.
[10] Jeffrey G. Andrews,et al. Resource Optimization in Device-to-Device Cellular Systems Using Time-Frequency Hopping , 2014, IEEE Transactions on Wireless Communications.
[11] Georges Kaddoum,et al. On the Uplink Secrecy Capacity Analysis in D2D-Enabled Cellular Network , 2018, IEEE Systems Journal.
[12] Jeffrey G. Andrews,et al. An Overview on 3GPP Device-to-Device Proximity Services , 2013, 1310.0116.
[13] Yu Gong,et al. Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.
[14] Cong Xiong,et al. Mode Switching for Energy-Efficient Device-to-Device Communications in Cellular Networks , 2015, IEEE Transactions on Wireless Communications.
[15] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[16] Yanchun Zhang,et al. On Secure Wireless Communications for Service Oriented Computing , 2018, IEEE Transactions on Services Computing.
[17] Jeffrey G. Andrews,et al. Spectrum Sharing for Device-to-Device Communication in Cellular Networks , 2013, IEEE Transactions on Wireless Communications.
[18] Daniel Camps-Mur,et al. Device-to-device communications with Wi-Fi Direct: overview and experimentation , 2013, IEEE Wireless Communications.
[19] Stefan Parkvall,et al. Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.
[20] Kwok Hung Li,et al. Enhanced Physical Layer Security in D2D Spectrum Sharing Networks , 2017, IEEE Wireless Communications Letters.
[21] Mounir Ghogho,et al. On the analysis of device-to-device overlaid cellular networks in the uplink under 3GPP propagation model , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[22] Mazen O. Hasna,et al. A Stochastic Geometric Analysis of Device-to-Device Communications Operating Over Generalized Fading Channels , 2016, IEEE Transactions on Wireless Communications.
[23] Olav Tirkkonen,et al. Resource Sharing Optimization for Device-to-Device Communication Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.
[24] Jiaheng Wang,et al. Security Enhancement via Device-to-Device Communication in Cellular Networks , 2016, IEEE Signal Processing Letters.
[25] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[26] Xiaoying Gan,et al. Cooperative Spectrum Sharing in D2D-Enabled Cellular Networks , 2016, IEEE Transactions on Communications.
[27] Carl Wijting,et al. Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.
[28] Jiaheng Wang,et al. Resource Management for Device-to-Device Communication: A Physical Layer Security Perspective , 2018, IEEE Journal on Selected Areas in Communications.
[29] Ali A. Nasir,et al. Mode Selection, Resource Allocation, and Power Control for D2D-Enabled Two-Tier Cellular Network , 2015, IEEE Transactions on Communications.
[30] M. Bibinger. Notes on the sum and maximum of independent exponentially distributed random variables with different scale parameters , 2013, 1307.3945.
[31] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[32] Mugen Peng,et al. Secrecy-Oriented Resource Sharing for Cellular Device-to-Device Underlay , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[33] Mingkai Chen,et al. Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network , 2018, IEEE Transactions on Vehicular Technology.
[34] Min Dong,et al. Multi-Channel Resource Allocation Toward Ergodic Rate Maximization for Underlay Device-to-Device Communications , 2018, IEEE Transactions on Wireless Communications.
[35] Zhu Han,et al. Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[36] Ramachandran Ramjee,et al. Generalized Proportional Fair Scheduling in Third Generation Wireless Data Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[37] Kun Zhu,et al. Joint Mode Selection and Spectrum Partitioning for Device-to-Device Communication: A Dynamic Stackelberg Game , 2015, IEEE Transactions on Wireless Communications.
[38] Li Sun,et al. Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation , 2016, IEEE Transactions on Vehicular Technology.
[39] Xi Zhang,et al. Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks , 2016, IEEE Journal on Selected Areas in Communications.
[40] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[41] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[42] Xiaohong Jiang,et al. Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming , 2015, Ad Hoc Sens. Wirel. Networks.
[43] Syed Faraz Hasan,et al. Heuristic Algorithm for Proportional Fair Scheduling in D2D-Cellular Systems , 2016, IEEE Transactions on Wireless Communications.