Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks
暂无分享,去创建一个
Yueming Cai | Jin Chen | An Wang | Yunpeng Cheng | Wendong Yang | Chunxiao Cai | Yueming Cai | Wendong Yang | Yunpeng Cheng | Jin Chen | Chunxiao Cai | An Wang
[1] Lawrence M. Ausubel. An Efficient Ascending-Bid Auction for Multiple Objects , 2004 .
[2] Peter Marbach,et al. Downlink resource allocation and pricing for wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[3] Zhu Han,et al. Physical layer security: Coalitional games for distributed cooperation , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[4] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[5] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[6] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[7] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[8] David J. Keffer,et al. Using Multiple-Mode Models for Fitting and Predicting Rheological Properties of Polymeric Melts , 2006 .
[9] Wei Yu,et al. Dual methods for nonconvex spectrum optimization of multicarrier systems , 2006, IEEE Transactions on Communications.
[10] Michael L. Honig,et al. Auction-Based Spectrum Sharing , 2006, Mob. Networks Appl..
[11] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[12] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[13] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[14] G. Nemhauser,et al. Integer Programming , 2020 .
[15] Zhu Han,et al. Improve physical layer security in cooperative wireless network using distributed auction games , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[16] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[17] Zhu Han,et al. Physical Layer Security for Two Way Relay Communications with Friendly Jammers , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[18] Zhu Han,et al. Auction-Based Resource Allocation for Cooperative Communications , 2008, IEEE Journal on Selected Areas in Communications.
[19] Jianhua Lu,et al. QoS aware relay selection and subcarrier allocation in cooperative OFDMA systems , 2010, IEEE Communications Letters.
[20] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[21] Chi Wan Sung,et al. A generalized framework for distributed power control in wireless networks , 2005, IEEE Trans. Inf. Theory.