暂无分享,去创建一个
[1] Mirza Hamza,et al. Outage Performance of L-Branch Maximal-Ratio Combiner for Generalized k-μ Fading , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[2] Gaofeng Pan,et al. Secrecy outage analysis with Kth best relay selection in dual-hop inter-vehicle communication systems , 2017 .
[3] Peng Yang,et al. Secrecy Throughput in Inhomogeneous Wireless Networks with Nonuniform Traffic , 2014, Int. J. Distributed Sens. Networks.
[4] Y. Wang,et al. Feedback enhances the security of wiretap channel with states , 2015 .
[5] Muhammad R. A. Khandaker,et al. Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.
[6] Jiaru Lin,et al. Optimal Secure Multicast With Simultaneous Wireless Information and Power Transfer in Presence of Multiparty Eavesdropper Collusion , 2016, IEEE Transactions on Vehicular Technology.
[7] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[8] Joseph Lipka,et al. A Table of Integrals , 2010 .
[9] Huiming Wang,et al. On secrecy throughput optimization of a DF relay network subjected to slow fading , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[10] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[11] Xiaodong Ji,et al. Secure random linear network coding on a wiretap network , 2015 .
[12] Miroslav Voznak,et al. Two-way relaying networks in green communications for 5G: Optimal throughput and tradeoff between relay distance on power splitting-based and time switching-based relaying SWIPT , 2016 .
[13] Gaofeng Pan,et al. Outage performance on threshold AF and DF relaying schemes in simultaneous wireless information and power transfer systems , 2017 .
[14] Hsiao-Hwa Chen,et al. Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.
[15] Meng Zhang,et al. Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.