Secure Transmission With Randomized Constellation Rotation for Downlink Sparse Code Multiple Access System
暂无分享,去创建一个
[1] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[2] Trung Q. Duong,et al. Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model , 2016, IEEE Transactions on Communications.
[3] Zhi Chen,et al. Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks , 2014, IEEE Transactions on Information Forensics and Security.
[4] Robert Michael Tanner,et al. A recursive approach to low complexity codes , 1981, IEEE Trans. Inf. Theory.
[5] Jonathan Rodriguez,et al. A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation , 2017, IEEE Transactions on Vehicular Technology.
[6] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[7] Guixia Kang,et al. A Dimension Distance-Based SCMA Codebook Design , 2017, IEEE Access.
[8] Milica Stojanovic,et al. Analysis of the impact of channel estimation errors on the performance of a decision-feedback equalizer in fading multipath channels , 1995, IEEE Trans. Commun..
[9] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[10] Wen Chen,et al. Low Complexity Iterative Receiver Design for Sparse Code Multiple Access , 2017, IEEE Transactions on Communications.
[11] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[12] Alireza Bayesteh,et al. SCMA Codebook Design , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).
[13] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[14] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[15] Vincent K. N. Lau,et al. On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.
[16] Yue Gao,et al. Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[17] Steven W. McLaughlin,et al. Physical-Layer Security: Combining Error Control Coding and Cryptography , 2009, 2009 IEEE International Conference on Communications.
[18] Yu Gong,et al. Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.
[19] Hosein Nikopour,et al. Sparse code multiple access , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[20] Victor C. M. Leung,et al. Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.
[21] Pingzhi Fan,et al. An optimized design of SCMA codebook based on star-QAM signaling constellations , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[22] Hui Zhao,et al. A top-down SCMA codebook design scheme based on lattice theory , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[23] Steven W. McLaughlin,et al. Tandem coding and cryptography on wiretap channels: EXIT chart analysis , 2009, 2009 IEEE International Symposium on Information Theory.
[24] Justin P. Coon,et al. Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[25] Tran Trung Duy,et al. Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.
[26] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[27] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[28] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[29] Ming Xiao,et al. Joint Multiuser Detection of Multidimensional Constellations Over Fading Channels , 2017, IEEE Transactions on Communications.
[30] Hanna Bogucka,et al. Toward secure energy harvesting cooperative networks , 2015, IEEE Communications Magazine.
[31] Xiaohu Ge,et al. 5G wireless communication systems: prospects and challenges [Guest Editorial] , 2014 .
[32] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[33] Lin Yang,et al. Low Complexity Message Passing Algorithm for SCMA System , 2016, IEEE Communications Letters.