A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks
暂无分享,去创建一个
Liran Ma | Tao Jing | Yan Huo | Yingkun Wen | Qinghe Gao | Liran Ma | Tao Jing | Yan Huo | Qinghe Gao | Yingkun Wen
[1] Xiaofeng Tao,et al. Physical Layer Security with Untrusted Relays in Wireless Cooperative Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[2] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[3] Xiaoshuang Xing,et al. Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks , 2017, IET Commun..
[4] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.
[5] Octavia A. Dobre,et al. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[6] Tony Q. S. Quek,et al. Confidential Cooperative Communication With Trust Degree of Potential Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.
[7] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[8] Anupam Joshi,et al. Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network , 2017, IET Commun..
[9] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[10] Zhen Li,et al. Achieving secure communications in multi-antenna cooperative cognitive radio networks using cooperative jamming , 2016, Int. J. Sens. Networks.
[11] Xi Zhang,et al. Secure resource allocation for polarization-enabled green cooperative cognitive radio networks with untrusted secondary users , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[12] Xiangyun Zhou,et al. Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.
[13] Arumugam Nallanathan,et al. Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game , 2016, IEEE Communications Letters.
[14] Hao Zhou,et al. Auction-Based Frameworks for Secure Communications in Static and Dynamic Cognitive Radio Networks , 2017, IEEE Transactions on Vehicular Technology.
[15] Anant Sahai,et al. SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.
[16] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[17] H. Urkowitz. Energy detection of unknown deterministic signals , 1967 .
[18] Ilsun You,et al. A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing , 2018, IEEE Access.
[19] Ha H. Nguyen,et al. Fast Global Optimal Power Allocation in Wireless Networks by Local D.C. Programming , 2012, IEEE Transactions on Wireless Communications.
[20] Kim-Kwang Raymond Choo,et al. Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices , 2018, IEEE Consumer Electronics Magazine.
[21] Brandon F. Lo. A survey of common control channel design in cognitive radio networks , 2011, Phys. Commun..
[22] Ying-Chang Liang,et al. Design of Learning-Based MIMO Cognitive Radio Systems , 2009, IEEE Transactions on Vehicular Technology.
[23] P. Saxena,et al. Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning , 2015, Comput. Secur..
[24] George K. Karagiannidis,et al. On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.
[25] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[26] H. Vincent Poor,et al. Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.
[27] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[28] Li Wang,et al. Cooperative Jamming-Aided Secrecy Enhancement in P2P Communications With Social Interaction Constraints , 2017, IEEE Transactions on Vehicular Technology.
[29] Zhihong Zhou,et al. Understanding structure-based social network de-anonymization techniques via empirical analysis , 2018, EURASIP J. Wirel. Commun. Netw..
[30] Ruidong Li,et al. Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.
[31] Xu Chen,et al. Social-aware relay selection for cooperative networking: An optimal stopping approach , 2014, 2014 IEEE International Conference on Communications (ICC).
[32] Zhenkai Liang,et al. Detecting Malicious Behaviors in JavaScript Applications , 2018, IEEE Access.
[33] Li Wang,et al. Jamming partner selection for maximising the worst D2D secrecy rate based on social trust , 2017, Trans. Emerg. Telecommun. Technol..
[34] Xiuzhen Cheng,et al. Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.
[35] Zhen Li,et al. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.
[36] Shijie Li,et al. Cost Efficiency in Coordinated Multiple-Point System Based on Multi-Source Power Supply , 2018, IEEE Access.
[37] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[38] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.