SRT analysis of relay selection in the presence of multiple co-channel interferers
暂无分享,去创建一个
Zan Li | Jiangbo Si | Hongyan Li | Haiyan Huang | Weilong Hu | Zan Li | J. Si | Hongyan Li | Weilong Hu | Haiyan Huang | Jiangbo Si
[1] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[2] Kiseon Kim,et al. Secrecy Outage Probability of Optimal Relay Selection for Secure AnF Cooperative Networks , 2015, IEEE Communications Letters.
[3] Feng Liu,et al. Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.
[4] Saeed Vahidian,et al. Relay Selection for Security-Constrained Cooperative Communication in the Presence of Eavesdropper's Overhearing and Interference , 2015, IEEE Wireless Communications Letters.
[5] Tran Trung Duy,et al. Secrecy performance analysis with relay selection methods under impact of co-channel interference , 2015, IET Commun..
[6] Qiang Liu,et al. Acquisition of channel state information in heterogeneous cloud radio access networks: challenges and research directions , 2015, IEEE Wireless Communications.
[7] Minyi Guo,et al. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.
[8] Wei-Ping Zhu,et al. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.
[9] Bo Ai,et al. Security and Reliability Performance Analysis for Cloud Radio Access Networks With Channel Estimation Errors , 2014, IEEE Access.
[10] Saeed Vahidian,et al. Performance analysis of two-way decode-and-forward relaying in the presence of co-channel interferences , 2014, 2014 22nd Iranian Conference on Electrical Engineering (ICEE).
[11] Mugen Peng,et al. Security-reliability performance of cognitive AF relay-based wireless communication system with channel estimation error , 2014, EURASIP Journal on Advances in Signal Processing.
[12] Jiasong Mu,et al. Throat polyp detection based on compressed big data of voice with support vector machine algorithm , 2014, EURASIP Journal on Advances in Signal Processing.
[13] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[14] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[15] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.
[16] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[17] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[18] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[19] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[20] Xiqin Wang,et al. Tradeoff between reliability and security in block ciphering systems with physical channel errors , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[21] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[22] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[23] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[24] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[25] Ian F. Akyildiz,et al. Wireless multimedia sensor networks: A survey , 2007, IEEE Wireless Communications.
[26] Xiaoning Ding,et al. Cooperative Relay Service in a Wireless LAN , 2007, IEEE Journal on Selected Areas in Communications.
[27] Stamatios V. Kartalopoulos,et al. A primer on cryptography in communications , 2006, IEEE Communications Magazine.
[28] M.E. Hellman,et al. An overview of public key cryptography , 1978, IEEE Communications Magazine.
[29] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[30] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[31] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[32] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..