Null-Steering Beamforming for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System
暂无分享,去创建一个
[1] Benjamin Friedlander,et al. Performance analysis of a null-steering algorithm based on direction-of-arrival estimation , 1989, IEEE Trans. Acoust. Speech Signal Process..
[2] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[3] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[4] Kai-Kit Wong,et al. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.
[5] Yue Gao,et al. Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[6] Joseph Lipka,et al. A Table of Integrals , 2010 .
[7] Qi Zhang,et al. Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.
[8] K P Peppas. A Simple, Accurate Approximation to the Sum of Gamma–Gamma Variates and Applications in MIMO Free-Space Optical Systems , 2011, IEEE Photonics Technology Letters.
[9] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[10] C. Fox. The $G$ and $H$ functions as symmetrical Fourier kernels , 1961 .
[11] Chee Yen Leow,et al. Full-Duplex Cooperative Non-Orthogonal Multiple Access With Beamforming and Energy Harvesting , 2018, IEEE Access.
[12] Zhiguo Ding,et al. Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.
[13] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[14] Keyvan Zarifi,et al. Collaborative Null-Steering Beamforming for Uniformly Distributed Wireless Sensor Networks , 2010, IEEE Transactions on Signal Processing.
[15] Zhiguo Ding,et al. Performance Analysis and Optimization for SWIPT Wireless Sensor Networks , 2017, IEEE Transactions on Communications.
[16] Anass Benjebbour,et al. System-level performance evaluation of downlink non-orthogonal multiple access (NOMA) , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[17] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[18] Zhiguo Ding,et al. Design of Cooperative Non-Orthogonal Multicast Cognitive Multiple Access for 5G Systems: User Scheduling and Performance Analysis , 2017, IEEE Transactions on Communications.
[19] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[20] Anass Benjebbour,et al. System-level performance of downlink NOMA for future LTE enhancements , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[21] Salman Durrani,et al. Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.
[22] Ranjan K. Mallik,et al. Performance analysis of MIMO free-space optical systems in gamma-gamma fading , 2009, IEEE Transactions on Communications.
[23] M. Chial,et al. in simple , 2003 .
[24] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[25] George K. Karagiannidis,et al. On the Distribution of the Sum of Gamma-Gamma Variates and Applications in RF and Optical Wireless Communications , 2009, IEEE Transactions on Communications.
[26] Jeffrey G. Andrews,et al. What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.
[27] Chee Yen Leow,et al. A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case , 2018, IEEE Access.
[28] Xiuzhen Cheng,et al. Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.