Weighted Sum Secrecy Rate Maximization for D2D Underlaid Cellular Networks
暂无分享,去创建一个
[1] P. Viswanath,et al. Fundamentals of Wireless Communication: The wireless channel , 2005 .
[2] Ming Chen,et al. Improving Wireless Physical Layer Security via D2D Communication , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[3] Taewon Hwang,et al. Energy Efficient Communication for Secure D2D Underlaid Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.
[4] Mazen O. Hasna,et al. A Collaboration Incentive Exploiting the Primary-Secondary Systems’ Cross Interference for PHY Security Enhancement , 2016, IEEE Journal of Selected Topics in Signal Processing.
[5] Hui-Ming Wang,et al. Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.
[6] John M. Cioffi,et al. Weighted sum-rate maximization using weighted MMSE for MIMO-BC beamforming design , 2008, IEEE Trans. Wirel. Commun..
[7] Kwok Hung Li,et al. Enhanced Physical Layer Security in D2D Spectrum Sharing Networks , 2017, IEEE Wireless Communications Letters.
[8] Ender Tekin,et al. Correction to: "the Gaussian multiple access wire-tap channel" and "the general Gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming" , 2010, IEEE Trans. Inf. Theory.
[9] Wei Xu,et al. Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[10] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[11] Robert Schober,et al. Secure Transmission With Large Numbers of Antennas and Finite Alphabet Inputs , 2017, IEEE Transactions on Communications.
[12] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[13] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[14] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[15] Pingzhi Fan,et al. Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise , 2014, IEEE Transactions on Wireless Communications.
[16] Zhi-Quan Luo,et al. Dynamic Spectrum Management: Complexity and Duality , 2008, IEEE Journal of Selected Topics in Signal Processing.
[17] Xiaodong Wang,et al. Robust Linear Precoder Design for Multi-Cell Downlink Transmission , 2010, IEEE Transactions on Signal Processing.
[18] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[19] Xiang Cheng,et al. Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).
[20] Ming Chen,et al. Energy-Efficient Resource Allocation in D2D Underlaid Cellular Uplinks , 2017, IEEE Communications Letters.
[21] Ming Chen,et al. Channel Allocation and Power Control in D2D Uplink Underlaid Cellular Networks , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[22] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[23] Xiang Cheng,et al. Joint power and access control for physical layer security in D2D communications underlaying cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[24] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[25] Yongming Huang,et al. Coordinated Multicell Multiuser Precoding for Maximizing Weighted Sum Energy Efficiency , 2014, IEEE Transactions on Signal Processing.
[26] David Tse,et al. Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.
[27] Geoffrey Ye Li,et al. Device-to-Device Communications Underlaying Cellular Networks , 2013, IEEE Transactions on Communications.
[28] Zhu Han,et al. Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[29] Ali Ghrayeb,et al. Secrecy Performance of Multi-User MISO VLC Broadcast Channels With Confidential Messages , 2018, IEEE Transactions on Wireless Communications.
[30] Hao Xu,et al. Resource Allocation for Energy-Efficient Transmission in D2D Underlaid Cellular Networks , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[31] Yun-Chol Jong,et al. An Efficient Global Optimization Algorithm for Nonlinear Sum-of-Ratios Problem ∗ † , 2012 .
[32] Nei Kato,et al. Device-to-Device Communication in LTE-Advanced Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[33] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[34] Mazen O. Hasna,et al. Proactive Spectrum Sharing Incentive for Physical Layer Security Enhancement Using Outdated CSI , 2016, IEEE Transactions on Wireless Communications.
[35] Wei Xu,et al. Robust Transmission Design for Multicell D2D Underlaid Cellular Networks , 2018, IEEE Transactions on Vehicular Technology.
[36] Xiaohu You,et al. Robust Beamforming With Partial Channel State Information for Energy Efficient Networks , 2015, IEEE Journal on Selected Areas in Communications.
[37] Guanding Yu,et al. Energy-Efficient Resource Allocation in Single-Cell OFDMA Systems: Multi-Objective Approach , 2015, IEEE Transactions on Wireless Communications.