Malicious-Behavior-Aware D2D Link Selection Mechanism
暂无分享,去创建一个
[1] Yong Wang,et al. Energy-Efficient Optimal Relay Selection in Cooperative Cellular Networks Based on Double Auction , 2015, IEEE Transactions on Wireless Communications.
[2] Jian Shen,et al. A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..
[3] Liang Deng,et al. Modified Elman neural network based neural adaptive inverse control of rate-dependent hysteresis , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[4] Raed A. Abd-Alhameed,et al. Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.
[5] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[6] Honggang Wang,et al. Social overlapping community-aware neighbor discovery for D2D communications , 2016, IEEE Wireless Communications.
[7] Francesco De Pellegrini,et al. On the achievable rate in a D2D cognitive secondary network under jamming attacks , 2014, 2014 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM).
[8] Boleslaw K. Szymanski,et al. Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[9] Jianbo Li,et al. MPAR: A movement pattern-aware optimal routing for social delay tolerant networks , 2015, Ad Hoc Networks.
[10] Olga Galinina,et al. On feasibility of 5G-grade dedicated RF charging technology for wireless-powered wearables , 2015, IEEE Wireless Communications.
[11] Yanyan Wang,et al. Dynamic Coding Control in Social Intermittent Connectivity Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[12] Huan Zhang,et al. Secrecy Outage Performance for SIMO Underlay Cognitive Radio Systems With Generalized Selection Combining Over Nakagami-$m$ Channels , 2016, IEEE Transactions on Vehicular Technology.
[13] Jianliang Xu,et al. Spatial-aware interest group queries in location-based social networks , 2014, Data Knowl. Eng..
[14] Junjie Yan,et al. Social Attribute Aware Incentive Mechanism for Device-to-Device Video Distribution , 2017, IEEE Transactions on Multimedia.
[15] B. Aazhang,et al. Cellular networks with an overlaid device to device network , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[16] Sungsoo Park,et al. Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.
[17] Carl Wijting,et al. Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.
[18] Tinghuai Ma,et al. A novel subgraph K+\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$K^{+}$$\end{document}-isomorphism method in social , 2017, Soft Computing.
[19] Aiqing Zhang,et al. SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.
[20] Xu Chen,et al. Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.
[21] Liang Zhou,et al. Mobile Device-to-Device Video Distribution , 2016, ACM Trans. Multim. Comput. Commun. Appl..
[22] Anupam Kumar Bairagi,et al. Trust based D2D communications for accessing services in Internet of Things , 2015, 2015 18th International Conference on Computer and Information Technology (ICCIT).
[23] Xu Chen,et al. Social trust and social reciprocity based cooperative D2D communications , 2013, MobiHoc.
[24] Jia Guo,et al. Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.
[25] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[26] Abraham Martín-Campillo,et al. Energy-efficient forwarding mechanism for wireless opportunistic networks in emergency scenarios , 2012, Comput. Commun..
[27] Stefan Parkvall,et al. Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.
[28] Honggang Wang,et al. Node Service Ability Aware Packet Forwarding Mechanism in Intermittently Connected Wireless Networks , 2016, IEEE Transactions on Wireless Communications.
[29] Yu Zhang,et al. Peer discovery for D2D communications based on social attribute and service attribute , 2017, J. Netw. Comput. Appl..
[30] Yonggang Wen,et al. Distributed Wireless Video Scheduling With Delayed Control Information , 2014, IEEE Transactions on Circuits and Systems for Video Technology.
[31] Victor C. M. Leung,et al. Joint Relay Scheduling, Channel Access, and Power Allocation for Green Cognitive Radio Communications , 2015, IEEE Journal on Selected Areas in Communications.
[32] Olav Tirkkonen,et al. Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..
[33] Xiang Cheng,et al. Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach , 2012, IEEE Journal on Selected Areas in Communications.
[34] Junjie Yan,et al. Trust-Oriented Partner Selection in D2D Cooperative Communications , 2017, IEEE Access.
[35] Xiaohu You,et al. NER-DRP: Dissemination-based Routing Protocol with Network-layer Error Control for Intermittently Connected Mobile Networks , 2012, Mob. Networks Appl..
[36] Gang Feng,et al. Cooperative Media Access Control With Optimal Relay Selection in Error-Prone Wireless Networks , 2014, IEEE Transactions on Vehicular Technology.
[37] Mohsen Guizani,et al. Impact of Execution Time on Adaptive Wireless Video Scheduling , 2014, IEEE Journal on Selected Areas in Communications.
[38] Sungsoo Park,et al. Reliability Improvement Using Receive Mode Selection in the Device-to-Device Uplink Period Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.
[39] Jianliang Xu,et al. Spatial-aware interest group queries in location-based social networks , 2012, Data Knowl. Eng..
[40] Zhu Han,et al. Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[41] Mohsen Guizani,et al. Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.
[42] Wenjia Li,et al. Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.
[43] Hsiao-Hwa Chen,et al. Intracluster Device-to-Device Relay Algorithm With Optimal Resource Utilization , 2013, IEEE Transactions on Vehicular Technology.
[44] P Sreelakshmi,et al. Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs , 2015 .