Jamming-Aided Secrecy Performance in Secure Uplink NOMA System
暂无分享,去创建一个
[1] Qi Zhang,et al. Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.
[2] E. Tekin,et al. On Secure Signaling for the Gaussian Multiple Access Wire-tap Channel , 2005, Conference Record of the Thirty-Ninth Asilomar Conference onSignals, Systems and Computers, 2005..
[3] Huiming Wang,et al. Enhancing the Physical Layer Security of Uplink Non-Orthogonal Multiple Access in Cellular Internet of Things , 2018, IEEE Access.
[4] E. Tekin. Secrecy Sum-Rates for the Multiple-Access WireTap Channel with Ergodic Block Fading , 2007 .
[5] George K. Karagiannidis,et al. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.
[6] H. Vincent Poor,et al. Securing Downlink Massive MIMO-NOMA Networks With Artificial Noise , 2019, IEEE Journal of Selected Topics in Signal Processing.
[7] Jinhong Yuan,et al. Beamforming Design and Power Allocation for Secure Transmission With NOMA , 2018, IEEE Transactions on Wireless Communications.
[8] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[9] Yijie Zhong,et al. Secure Computation Efficiency Maximization in NOMA-Enabled Mobile Edge Computing Networks , 2019, IEEE Access.
[10] Shuangfeng Han,et al. Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.
[11] Zhen Li,et al. SIC-Based Secrecy Performance in Uplink NOMA Multi-Eavesdropper Wiretap Channels , 2018, IEEE Access.
[12] Zhenling Wang,et al. Secrecy Performance Analysis of Relay Selection in Cooperative NOMA Systems , 2019, IEEE Access.
[13] Shihao Yan,et al. Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.
[14] Jianwei Xie,et al. Secure degrees of freedom of the Gaussian multiple access wiretap channel , 2013, 2013 IEEE International Symposium on Information Theory.
[15] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[16] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[17] Fuhui Zhou,et al. Secure Cooperative Communications With an Untrusted Relay: A NOMA-Inspired Jamming and Relaying Approach , 2019, IEEE Transactions on Information Forensics and Security.
[18] Sudhan Majhi,et al. Secure Beamforming for MIMO-NOMA-Based Cognitive Radio Network , 2018, IEEE Communications Letters.
[19] Lajos Hanzo,et al. Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.
[20] Jian Yang,et al. Security-Aware Resource Allocation With Delay Constraint for NOMA-Based Cognitive Radio Network , 2018, IEEE Transactions on Information Forensics and Security.
[21] Quanzhong Li,et al. Secure Beamforming in Downlink MIMO Nonorthogonal Multiple Access Networks , 2017, IEEE Signal Processing Letters.
[22] Kai-Kit Wong,et al. A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked Beamforming , 2012, IEEE Communications Letters.
[23] Raef Bassily,et al. Ergodic Secret Alignment , 2010, IEEE Transactions on Information Theory.
[24] Eiji Okamoto,et al. An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation , 2019, 2019 International Conference on Information Networking (ICOIN).
[25] Zhen Li,et al. Individual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation , 2017, EURASIP J. Wirel. Commun. Netw..
[26] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[27] Rose Qingyang Hu,et al. Security-Reliability Tradeoff Analysis for Cooperative NOMA in Cognitive Radio Networks , 2019, IEEE Transactions on Communications.
[28] Mohamed-Slim Alouini,et al. Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.
[29] Zhen Li,et al. ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel , 2017, IEEE Access.
[30] Qi Zhang,et al. Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.
[31] Xin Fan,et al. The Secrecy Analysis over Physical Layer in NOMA-Enabled Cognitive Radio Networks , 2018, 2018 IEEE International Conference on Communications (ICC).
[32] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[33] Yueming Cai,et al. Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.
[34] Yuanwei Liu,et al. Physical Layer Security in Uplink NOMA Multi-Antenna Systems With Randomly Distributed Eavesdroppers , 2017, IEEE Access.
[35] Cheng-Xiang Wang,et al. Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.
[36] Zhen Li,et al. Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[37] Norman C. Beaulieu,et al. Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks , 2019, IEEE Transactions on Communications.
[38] Pritam Mukherjee,et al. Secure degrees of freedom of the multiple access wiretap channel with no eavesdropper CSI , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[39] Jianwei Xie,et al. Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure , 2014, IEEE Transactions on Information Theory.