Energy-efficient secure multiuser scheduling in energy harvesting untrusted relay networks
暂无分享,去创建一个
Xiangdong Wang | Yueming Cai | Weiwei Yang | Yunpeng Cheng | Jianwei Hu | Dechuan Chen | Yueming Cai | Weiwei Yang | Yunpeng Cheng | Dechuan Chen | Jianwei Hu | Xiangdong Wang
[1] Yueming Cai,et al. Secure Downlink Transmission in the Internet of Things: How Many Antennas Are Needed? , 2018, IEEE Journal on Selected Areas in Communications.
[2] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[3] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[4] Xiangfeng Wang,et al. Joint Power Splitting and Secure Beamforming Design in the Multiple Non-Regenerative Wireless-Powered Relay Networks , 2015, IEEE Communications Letters.
[5] Li Sun,et al. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes , 2015, IEEE Communications Letters.
[6] Adrish Banerjee,et al. Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[7] Yueming Cai,et al. Secure Transmission Design With Feedback Compression for the Internet of Things , 2018, IEEE Transactions on Signal Processing.
[8] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[9] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[10] John S. Thompson,et al. Amplify-and-forward with partial relay selection , 2008, IEEE Communications Letters.
[11] Ali A. Nasir,et al. Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.
[12] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[13] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[14] K. J. Ray Liu,et al. Advances in Energy Harvesting Communications: Past, Present, and Future Challenges , 2016, IEEE Communications Surveys & Tutorials.
[15] Ali Kuhestani,et al. Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems With Untrusted Relays and Passive Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[16] Kamel Tourki,et al. Adaptive Secure Transmission for RF-EH Untrusted Relaying with Alien Eavesdropping , 2017, IEEE Communications Letters.
[17] Michael Gastpar,et al. Secure Transmission on the Two-Hop Relay Channel With Scaled Compute-and-Forward , 2015, IEEE Transactions on Information Theory.
[18] Zhu Han,et al. Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach , 2016, IEEE Transactions on Communications.
[19] Aylin Yener,et al. Multi-Terminal Two-Hop Untrusted-Relay Networks With Hierarchical Security Guarantees , 2017, IEEE Transactions on Information Forensics and Security.
[20] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.
[21] H. Vincent Poor,et al. Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks , 2013, IEEE Transactions on Wireless Communications.
[22] Rose Qingyang Hu,et al. Multiuser Cognitive Relay Networks: Joint Impact of Direct and Relay Communications , 2014, IEEE Transactions on Wireless Communications.
[23] Do-Hoon Kim,et al. Opportunistic Transmission of Nonregenerative Network With Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[24] Farshad Lahouti,et al. Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.
[25] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[26] George K. Karagiannidis,et al. Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.
[27] Zhu Han,et al. Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.
[28] Dongtang Ma,et al. Destination-Aided Cooperative Jamming for Dual-Hop Amplify-and-Forward MIMO Untrusted Relay Systems , 2016, IEEE Transactions on Vehicular Technology.
[29] Yueming Cai,et al. Energy-Efficient Secure Transmission Design for the Internet of Things With an Untrusted Relay , 2018, IEEE Access.
[30] Xiaofeng Tao,et al. Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks , 2018, IEEE Access.
[31] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[32] Yueming Cai,et al. Physical Layer Security in Cognitive Untrusted Relay Networks , 2018, IEEE Access.
[33] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[34] Tao Zhang,et al. Secure Multiantenna Cognitive Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.
[35] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[36] Kin K. Leung,et al. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.
[37] Quanzhong Li,et al. Robust AN-Aided Secure Precoding for an AF MIMO Untrusted Relay System , 2017, IEEE Transactions on Vehicular Technology.
[38] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[39] Yueming Cai,et al. Energy efficiency analysis and enhancement for secure transmission in SWIPT systems exploiting full duplex techniques , 2016, IET Commun..
[40] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.