A Cooperative Jamming Based Secure Uplink Transmission Scheme for Heterogeneous Networks Supporting D2D Communications
暂无分享,去创建一个
Chunqiang Hu | Xin Fan | Jingjing Fan | Yan Huo | Guanlin Jing | Yan Huo | Xin Fan | Guanlin Jing | Chun-qiang Hu | Jingjing Fan
[1] Mohamed-Slim Alouini,et al. Power Control for D2D Underlay Cellular Networks With Channel Uncertainty , 2017, IEEE Transactions on Wireless Communications.
[2] Abdelmadjid Bouabdallah,et al. M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.
[3] Jianzhong Li,et al. A Study on Application-Aware Scheduling in Wireless Networks , 2017, IEEE Transactions on Mobile Computing.
[4] Xiang Cheng,et al. Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).
[5] Jianzhong Li,et al. Curve Query Processing in Wireless Sensor Networks , 2015, IEEE Transactions on Vehicular Technology.
[6] Xiang Cheng,et al. Joint power and access control for physical layer security in D2D communications underlaying cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[7] Chunqiang Hu,et al. A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI , 2017, IEEE Access.
[8] Chengwen Xing,et al. Guard Zone Based Interference Management for D2D-Aided Underlaying Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.
[9] Jianzhong Li,et al. Drawing dominant dataset from big sensory data in wireless sensor networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[10] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[11] Xiaoying Gan,et al. Cooperative Spectrum Sharing in D2D-Enabled Cellular Networks , 2016, IEEE Transactions on Communications.
[12] Zhi-Zhong Chen,et al. A 3.4713-approximation algorithm for the capacitated multicast tree routing problem , 2009, Theor. Comput. Sci..
[13] Yu Cheng,et al. Secrecy-oriented partner selection based on social trust in device-to-device communications , 2015, 2015 IEEE International Conference on Communications (ICC).
[14] Guohui Lin,et al. Improved Approximation Algorithms for the Capacitated Multicast Routing Problem , 2005, COCOON.
[15] Jeffrey G. Andrews,et al. Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis , 2013, IEEE Journal on Selected Areas in Communications.
[16] Xinbing Wang,et al. On the performance of interference cancelation in D2D-enabled cellular networks , 2016, Wirel. Commun. Mob. Comput..
[17] Ali A. Nasir,et al. Mode Selection, Resource Allocation, and Power Control for D2D-Enabled Two-Tier Cellular Network , 2015, IEEE Transactions on Communications.
[18] K. Cumanan,et al. Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints , 2017, IEEE Transactions on Vehicular Technology.
[19] Holger Jaekel,et al. Cooperative interference cancellation using device-to-device communications , 2014, IEEE Communications Magazine.
[20] Jiguo Yu,et al. Approximate Holistic Aggregation in Wireless Sensor Networks , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[21] Zhipeng Cai,et al. Approximate aggregation for tracking quantiles and range countings in wireless sensor networks , 2015, Theor. Comput. Sci..
[22] Chunqiang Hu,et al. LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing , 2017, IEEE Internet of Things Journal.
[23] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[24] Jianzhong Li,et al. Extracting Kernel Dataset from Big Sensory Data in Wireless Sensor Networks , 2017, IEEE Transactions on Knowledge and Data Engineering.
[25] Michail Matthaiou,et al. Beamforming and Interference Cancellation for D2D Communication Underlaying Cellular Networks , 2016, IEEE Transactions on Communications.
[26] Xiuzhen Cheng,et al. Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.
[27] Jeffrey G. Andrews,et al. Spectrum Sharing for Device-to-Device Communication in Cellular Networks , 2013, IEEE Transactions on Wireless Communications.