Social Trust Aided D2D Communications: Performance Bound and Implementation Mechanism
暂无分享,去创建一个
Xinlei Chen | Sheng Chen | Yulei Zhao | Yong Li | Ning Ge | Xu Chen | Yong Li | N. Ge | Xu Chen | Yulei Zhao | Xinlei Chen | Sheng Chen
[1] Jianping Pan,et al. Scheduling in a secure wireless network , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[2] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[3] Walid Saad,et al. A college admissions game for uplink user association in wireless small cell networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[4] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[5] Zaher Dawy,et al. Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.
[6] Carl Wijting,et al. Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.
[7] Miao Pan,et al. Matching and Cheating in Device to Device Communications Underlying Cellular Networks , 2015, IEEE Journal on Selected Areas in Communications.
[8] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[9] Zhu Han,et al. Social-Aware Peer Discovery for D2D Communications Underlaying Cellular Networks , 2015, IEEE Transactions on Wireless Communications.
[10] Walid Saad,et al. Matching theory for future wireless networks: fundamentals and applications , 2014, IEEE Communications Magazine.
[11] Aleksandr Ometov,et al. Toward trusted, social-aware D2D connectivity: bridging across the technology and sociality realms , 2016, IEEE Wireless Communications.
[12] Jeffrey G. Andrews,et al. Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis , 2013, IEEE Journal on Selected Areas in Communications.
[13] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[14] Nei Kato,et al. A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[15] Xu Chen,et al. A social group utility maximization framework with applications in database assisted spectrum access , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[16] Jeffrey G. Andrews,et al. Spectrum Sharing for Device-to-Device Communication in Cellular Networks , 2013, IEEE Transactions on Wireless Communications.
[17] Xu Chen,et al. Social trust and social reciprocity based cooperative D2D communications , 2013, MobiHoc.
[18] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[19] Halim Yanikomeroglu,et al. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.
[20] Jeffrey G. Andrews,et al. Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.
[21] Olga Galinina,et al. Network-Assisted Device-to-Device Connectivity: Contemporary Vision and Open Challenges , 2015 .
[22] Zhu Han,et al. Efficient resource allocation for mobile social networks in D2D communication underlaying cellular networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[23] George C. Polyzos,et al. Security and performance challenges for user-centric wireless networking , 2014, IEEE Communications Magazine.
[24] Xu Chen,et al. SoCast: Social ties based cooperative video multicast , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[25] Baochun Li,et al. Seen as stable marriages , 2011, 2011 Proceedings IEEE INFOCOM.
[26] Sheng Chen,et al. Social-aware D2D communications: qualitative insights and quantitative analysis , 2014, IEEE Communications Magazine.
[27] Zhu Han,et al. Social-aware multi-file dissemination in Device-to-Device overlay networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[28] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[29] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[30] Zhu Han,et al. Coalitional Games for Resource Allocation in the Device-to-Device Uplink Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.
[31] Xuemin Shen,et al. Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.