Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming
暂无分享,去创建一个
Xiuzhen Cheng | Liran Ma | Xin Fan | Zhi Tian | Dechang Chen | Yan Huo | Xiuzhen Cheng | Dechang Chen | Z. Tian | Liran Ma | Yan Huo | Xin Fan
[1] Donald F. Towsley,et al. Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.
[2] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[3] Qi Zhang,et al. Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks , 2016, IEEE Transactions on Vehicular Technology.
[4] Chen-Mou Cheng,et al. Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.
[5] Jeffrey G. Andrews,et al. Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.
[6] George K. Karagiannidis,et al. Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.
[7] Zhen Li,et al. Worst-Case Jamming for Secure Communications in Multi-antenna Cooperative Cognitive Radio Networks with Energy Harvesting , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).
[8] Kai-Kit Wong,et al. Safeguarding massive MIMO aided hetnets using physical layer security , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[9] Xiaofeng Tao,et al. Secrecy Outage Probability in Multi-RAT Heterogeneous Networks , 2016, IEEE Communications Letters.
[10] Tiejun Lv,et al. Semi-Blind Channel Estimation Relying on Optimum Pilots Designed for Multi-Cell Large-Scale MIMO Systems , 2016, IEEE Access.
[11] Xiaoshuang Xing,et al. Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[12] Hyung Yun Kong,et al. CSI-Secured Orthogonal Jamming Method for Wireless Physical Layer Security , 2014, IEEE Communications Letters.
[13] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[14] Derrick Wing Kwan Ng,et al. Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.
[15] Georges Kaddoum,et al. A Survey on Cooperative Jamming Applied to Physical Layer Security , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[16] Xiaoshuang Xing,et al. Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks , 2017, IET Commun..
[17] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[18] João P. Vilela,et al. Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers , 2018, IEEE Transactions on Information Forensics and Security.
[19] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[20] Qi Zhang,et al. Robust Beamforming for Nonorthogonal Multiple-Access Systems in MISO Channels , 2016, IEEE Transactions on Vehicular Technology.
[21] A. Lee Swindlehurst,et al. Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.
[22] J. Magnus,et al. Matrix Differential Calculus with Applications in Statistics and Econometrics , 1991 .
[23] Zhijin Qin,et al. Non-Orthogonal Multiple Access in Large-Scale Heterogeneous Networks , 2017, IEEE Journal on Selected Areas in Communications.
[24] Jinho Choi,et al. Downlink Throughput Maximization for OFDMA Systems With Feedback Channel Capacity Constraints , 2011, IEEE Transactions on Signal Processing.
[25] J. Magnus,et al. Matrix Differential Calculus with Applications in Statistics and Econometrics (Revised Edition) , 1999 .
[26] H. Vincent Poor,et al. Non-Orthogonal Multiple Access in Multi-Cell Networks: Theory, Performance, and Practical Challenges , 2016, IEEE Communications Magazine.
[27] Bjorn Ottersten,et al. Optimal Downlink BeamformingUsing Semidefinite Optimization , 1999 .
[28] Tiejun Lv,et al. Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.
[29] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[30] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[31] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[32] Shi Jin,et al. Performance Analysis of Mixed-ADC Massive MIMO Systems Over Rician Fading Channels , 2017, IEEE Journal on Selected Areas in Communications.
[33] Mounir Ghogho,et al. Physical-Layer Secrecy of MIMO Communications in the Presence of a Poisson Random Field of Eavesdroppers , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[34] Yongbin Wei,et al. A survey on 3GPP heterogeneous networks , 2011, IEEE Wireless Communications.
[35] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[36] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[37] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[38] Jeffrey G. Andrews,et al. What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.
[39] Tiejun Lv,et al. Robust Beamforming and Power Allocation for Secrecy in DF Relay Networks With Imperfect Channel State Information , 2016, IEEE Access.
[40] Hongjian Sun,et al. Unified Framework for the Effective Rate Analysis of Wireless Communication Systems Over MISO Fading Channels , 2017, IEEE Transactions on Communications.
[41] Andrea J. Goldsmith,et al. Optimality of zero-forcing beamforming with multiuser diversity , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[42] Liang Huang,et al. Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information , 2017, WASA.
[43] Chunqiang Hu,et al. A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI , 2017, IEEE Access.
[44] Jin Xu,et al. Secure Transmission in MISOME Wiretap Channel With Multiple Assisting Jammers: Maximum Secrecy Rate and Optimal Power Allocation , 2017, IEEE Transactions on Communications.
[45] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[46] Xiuzhen Cheng,et al. Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.
[47] Zhen Li,et al. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.
[48] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[49] Eduard A. Jorswieck. Secrecy capacity of single- and multi-antenna channels with simple helpers , 2010, 2010 International ITG Conference on Source and Channel Coding (SCC).
[50] Haralabos C. Papadopoulos,et al. Physical-layer secrecy in AWGN via a class of chaotic DS/SS systems: analysis and design , 2004, IEEE Transactions on Signal Processing.
[51] Marwan Krunz,et al. Friendly Jamming in a MIMO Wiretap Interference Network: A Nonconvex Game Approach , 2017, IEEE Journal on Selected Areas in Communications.
[52] George K. Karagiannidis,et al. Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks , 2017, IEEE Access.
[53] Xianbin Wang,et al. Security enhancement in cooperative jamming using compromised secrecy region minimization , 2013, 2013 13th Canadian Workshop on Information Theory.
[54] Navrati Saxena,et al. Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.
[55] Xiaohong Jiang,et al. On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.
[56] Jeffrey G. Andrews,et al. Heterogeneous cellular networks: From theory to practice , 2012, IEEE Communications Magazine.
[57] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[58] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[59] Philippe Loubaton,et al. A subspace algorithm for certain blind identification problems , 1997, IEEE Trans. Inf. Theory.
[60] Ha H. Nguyen,et al. Fast Global Optimal Power Allocation in Wireless Networks by Local D.C. Programming , 2012, IEEE Transactions on Wireless Communications.
[61] Xiuzhen Cheng,et al. Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[62] A. Lee Swindlehurst,et al. Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.
[63] Qi Zhang,et al. Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.