On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation
暂无分享,去创建一个
Xuejun Sha | Ning Zhang | Xuemin Shen | Shan Zhang | Xiaojie Fang | Dajiang Chen | Ning Zhang | X. Shen | Xiaojie Fang | X. Sha | Dajiang Chen | Shan Zhang
[1] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[2] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[3] Xuejun Sha,et al. Performance Analysis of Hybrid Carrier System with MMSE Equalization over Doubly-Dispersive Channels , 2012, IEEE Communications Letters.
[4] Dusit Niyato,et al. Coalition-Based Cooperative Packet Delivery under Uncertainty: A Dynamic Bayesian Coalitional Game , 2013, IEEE Transactions on Mobile Computing.
[5] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[8] Aydin Sezgin,et al. Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.
[9] Feng Liu,et al. Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.
[10] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[11] Qinyu Zhang,et al. WFRFT Precoding for Narrowband Interference Suppression in DFT-Based Block Transmission Systems , 2013, IEEE Communications Letters.
[12] Jia Zhu,et al. Power-Constrained Secrecy Rate Maximization for Joint Relay and Jammer Selection Assisted Wireless Networks , 2017, IEEE Transactions on Communications.
[13] Xuejun Sha,et al. Secret Communication Using Parallel Combinatory Spreading WFRFT , 2015, IEEE Commun. Lett..
[14] Zhenduo Wang,et al. BER analysis of hybrid carrier system based on WFRFT with carrier frequency offset , 2015 .
[15] Xuejun Sha,et al. Iterative frequency-domain equalization for WFRFT and EST based modulation schemes over doubly selective wireless fading channels , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[16] Xiang Zhang,et al. Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.
[17] Zhu Han,et al. Distributed Coalition Formation Games for Secure Wireless Transmission , 2009, Mob. Networks Appl..
[18] Donald F. Towsley,et al. Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.
[19] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[20] Xuejun Sha,et al. The approach to carrier scheme convergence based on 4-weighted fractional fourier transform , 2010, IEEE Communications Letters.
[21] Zhu Han,et al. Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.
[22] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[23] Aylin Yener,et al. MIMO Broadcast Channel with Arbitrarily Varying Eavesdropper Channel: Secrecy Degrees of Freedom , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[24] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[25] Li Yong,et al. Secret Communication Using Parallel Combinatory Spreading WFRFT , 2015, IEEE Communications Letters.
[26] Mounir Ghogho,et al. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.
[27] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[28] Xuejun Sha,et al. Low Complexity Equalization of HCM Systems with DPFFT Demodulation over Doubly-Selective Channels , 2014, IEEE Signal Processing Letters.
[29] Xuemin Shen,et al. Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.
[30] Xiaohui Liang,et al. Security and privacy in mobile social networks: challenges and solutions , 2014, IEEE Wireless Communications.
[31] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[32] Daniel S. Yeung,et al. General multifractional Fourier transform method based on the generalized permutation matrix group , 2005, IEEE Transactions on Signal Processing.
[33] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[34] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[35] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[36] Rafael F. Schaefer,et al. The Secrecy Capacity of Compound Gaussian MIMO Wiretap Channels , 2015, IEEE Transactions on Information Theory.
[37] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[38] Xuemin Shen,et al. Safeguarding Physical Layer Security Using Weighted Fractional Fourier Transform , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[39] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[40] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[41] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.