Secrecy capacity results for a secure NOMA-based cognitive radio network with an external eavesdropper
暂无分享,去创建一个
Hadi Seyedarabi | K. Adli Mehr | J. Musevi Niya | S. Khoshabi Nobar | Hadi Seyedarabi | S. K. Nobar | J. M. Niya | K. A. Mehr
[1] Daniela Tuninetti,et al. Multi-user Cognitive Interference Channels: A Survey and New Capacity Results , 2015, IEEE Transactions on Cognitive Communications and Networking.
[2] Shun Watanabe,et al. Cognitive Interference Channels With Confidential Messages Under Randomness Constraint , 2014, IEEE Transactions on Information Theory.
[3] Bahareh Akhbari,et al. Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message , 2016, IEEE Transactions on Information Forensics and Security.
[4] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[5] Xin Fan,et al. The Secrecy Analysis over Physical Layer in NOMA-Enabled Cognitive Radio Networks , 2018, 2018 IEEE International Conference on Communications (ICC).
[6] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[7] Maria Rita Palattella,et al. Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.
[8] Abbas El Gamal,et al. Three-Receiver Broadcast Channels With Common and Confidential Messages , 2012, IEEE Transactions on Information Theory.
[9] Sangeeta Bhattacharjee. Friendly Jamming Assisted Secure Cooperative Multicasting in Cognitive Radio-NOMA Networks , 2019, 2019 IEEE Globecom Workshops (GC Wkshps).
[10] Elisabeth Uhlemann,et al. Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints , 2020, IEEE Access.
[11] Alexander Schrijver,et al. Theory of linear and integer programming , 1986, Wiley-Interscience series in discrete mathematics and optimization.
[12] Hossein Khoshbin Ghomash,et al. New Inner Bounds for the Gaussian Interference Channel with a Cognitive Relay , 2019, 2019 Iran Workshop on Communication and Information Theory (IWCIT).
[13] Mohammad Reza Aref,et al. Cognitive interference channel with two confidential messages , 2010, 2010 International Symposium On Information Theory & Its Applications.
[14] Jian Yang,et al. Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network , 2018, IEEE Transactions on Information Forensics and Security.
[15] Reza Khosravi-Farsani,et al. Capacity theorems for the Cognitive Radio Channel with confidential messages , 2014, 2014 IEEE International Symposium on Information Theory.
[16] Bahareh Akhbari,et al. Multiple access channel with common message and secrecy constraint , 2014, IET Commun..
[17] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[18] Shuangfeng Han,et al. Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.
[19] Ming Xiao,et al. Strong Secrecy for Interference Channels Based on Channel Resolvability , 2018, IEEE Transactions on Information Theory.
[20] Katalin Marton,et al. A coding theorem for the discrete memoryless broadcast channel , 1979, IEEE Trans. Inf. Theory.
[21] Roy D. Yates,et al. Secrecy capacity region of a class of one-sided interference channel , 2008, 2008 IEEE International Symposium on Information Theory.
[22] Aylin Yener,et al. A new outer bound for the gaussian interference channel with confidential messages , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[23] Dinesh Rajan,et al. An Achievable Region for the Cognitive Interference Relay Channel , 2018, IEEE Transactions on Cognitive Communications and Networking.
[24] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[25] Pablo Piantanida,et al. Secrecy Capacity Region of Some Classes of Wiretap Broadcast Channels , 2014, IEEE Transactions on Information Theory.
[26] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[27] Sarah J. Johnson,et al. Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations , 2016, IEEE Communications Magazine.
[28] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[29] Jun Li,et al. Quality-of-Service Control in GRAMS for ATM Local Area Network , 1995, IEEE J. Sel. Areas Commun..
[30] Fan Li,et al. Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel , 2019, IEEE Transactions on Information Forensics and Security.
[31] Mahtab Mirmohseni,et al. On the secrecy of the cognitive interference channel with partial channel states , 2015, Trans. Emerg. Telecommun. Technol..
[32] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[33] Amin Gohari,et al. Evaluation of Marton's inner bound for the general broadcast channel , 2009, ISIT.
[34] Ying-Chang Liang,et al. State of the Art, Taxonomy, and Open Issues on Cognitive Radio Networks with NOMA , 2018, IEEE Wireless Communications.
[35] Mikael Skoglund,et al. On the Optimization of the Secondary Transmitter's Strategy in Cognitive Radio Channels with Secrecy , 2014, IEEE Journal on Selected Areas in Communications.
[36] Anass Benjebbour,et al. Non-Orthogonal Multiple Access (NOMA) for Cellular Future Radio Access , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).
[37] Andrea J. Goldsmith,et al. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.
[38] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[39] Rose Qingyang Hu,et al. Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks , 2019, IEEE Transactions on Communications.
[40] Mikael Skoglund,et al. New Achievable Rates for Gaussian Partially Cognitive Interference Channels With Multiple Cognitive Pairs , 2014, IEEE Transactions on Communications.
[41] Sennur Ulukus,et al. Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.
[42] Jiaxin Wu,et al. Secrecy rate and residual energy trade-off in energy harvesting cognitive radio networks , 2019, Phys. Commun..
[43] Thomas M. Cover,et al. Broadcast channels , 1972, IEEE Trans. Inf. Theory.
[44] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[45] Muhammad Ali Imran,et al. Cloud empowered Cognitive Inter-cell Interference Coordination for small cellular networks , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[46] Shilpa Thakur,et al. Secure transmission in underlay cognitive radio network with outdated channel state information , 2019, Phys. Commun..
[47] Jinhua Jiang,et al. Interference Channels With Common Information , 2006, IEEE Transactions on Information Theory.
[48] H. Vincent Poor,et al. On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.
[49] Yueming Cai,et al. Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.
[50] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[51] Onur Ozan Koyluoglu,et al. Secrecy games over the cognitive channel , 2010, 2010 IEEE International Symposium on Information Theory.
[52] Mahtab Mirmohseni,et al. Three-user cognitive interference channel: capacity region with strong interference , 2012, IET Commun..
[53] Shlomo Shamai,et al. Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.
[54] Mahtab Mirmohseni,et al. One-Receiver Two-Eavesdropper Broadcast Channel With Degraded Message Sets , 2013, IEEE Transactions on Information Forensics and Security.
[55] Martina Cardone,et al. The Two-User Causal Cognitive Interference Channel: Novel Outer Bounds and Constant Gap Result for the Symmetric Gaussian Noise Channel in Weak Interference , 2016, IEEE Transactions on Information Theory.
[56] Shlomo Shamai,et al. On the capacity of interference channels with one cooperating transmitter , 2007, Eur. Trans. Telecommun..
[57] François Gagnon,et al. Cognitive radio network with secrecy and interference constraints , 2017, Phys. Commun..
[58] Tolga M. Duman,et al. LDPC Codes for Interference Channels in the Primary Decodes Cognitive Regime , 2019, IEEE Wireless Communications Letters.
[59] H. Vincent Poor,et al. On the secure degrees of freedom in the K-user Gaussian interference channel , 2008, 2008 IEEE International Symposium on Information Theory.
[60] Stefano Rini. The fast fading Z cognitive interference channel , 2018, 2018 Iran Workshop on Communication and Information Theory (IWCIT).
[61] Jinyuan Chen. Secure Communication Over Interference Channel: To Jam or not to Jam? , 2020, IEEE Transactions on Information Theory.
[62] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[63] Panagiotis Papadimitratos,et al. Security in the Gaussian interference channel: Weak and moderately weak interference regimes , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[64] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[65] Yingbin Liang,et al. Bounds and Capacity Theorems for Cognitive Interference Channels With State , 2012, IEEE Transactions on Information Theory.