Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme
暂无分享,去创建一个
Li Xu | Xianbin Wang | He Fang | Xianbin Wang | Li Xu | He Fang
[1] Branka Vucetic,et al. A Physical-Layer Rateless Code for Wireless Channels , 2013, IEEE Transactions on Communications.
[2] Octavia A. Dobre,et al. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[3] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[4] Erik G. Larsson,et al. Competition Versus Cooperation on the MISO Interference Channel , 2008, IEEE Journal on Selected Areas in Communications.
[5] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[6] Lifeng Wang,et al. Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.
[7] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[8] Shuguang Cui,et al. Price-Based Spectrum Management in Cognitive Radio Networks , 2008, IEEE J. Sel. Top. Signal Process..
[9] H. Vincent Poor,et al. Security Enhancement of Cooperative Single Carrier Systems , 2015, IEEE Transactions on Information Forensics and Security.
[10] Ning Zhang,et al. Security-aware Cooperation in Cognitive Radio Networks , 2014, SpringerBriefs in Computer Science.
[11] Raef Bassily,et al. Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks , 2013, IEEE Transactions on Signal Processing.
[12] Sungwook Kim. Multi-leader multi-follower Stackelberg model for cognitive radio spectrum sharing scheme , 2012, Comput. Networks.
[13] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[14] Kwok Hung Li,et al. Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes , 2016, IEEE Transactions on Information Forensics and Security.
[15] Christopher Leckie,et al. A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning , 2016, IEEE Transactions on Information Forensics and Security.
[16] Naveen K. Chilamkurti,et al. Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment , 2016, IEEE Transactions on Dependable and Secure Computing.
[17] Zhu Han,et al. Interference Improves PHY Security for Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[18] Aydin Behnad,et al. Distributed Resource Allocation for Multihop Decode-and-Forward Relay Systems , 2015, IEEE Transactions on Vehicular Technology.
[19] Kin K. Leung,et al. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.
[20] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[21] Rainer Böhme,et al. Game Theory and Adaptive Steganography , 2016, IEEE Transactions on Information Forensics and Security.
[22] Sergio Barbarossa,et al. IEEE TRANSACTIONS ON SIGNAL PROCESSING (ACCEPTED) 1 The MIMO Iterative Waterfilling Algorithm , 2022 .
[23] Mihaela van der Schaar,et al. Bargaining Strategies for Networked Multimedia Resource Management , 2007, IEEE Transactions on Signal Processing.
[24] Wenyu Luo,et al. Cooperative Interference Based on Evolutionary Game in Wire-Tap Channel , 2014 .
[25] Francis Minhthang Bui,et al. Delay-Aware Optimization of Physical Layer Security in Multi-Hop Wireless Body Area Networks , 2016, IEEE Transactions on Information Forensics and Security.
[26] Li Xu,et al. Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks , 2017, Appl. Math. Comput..
[27] Minyi Guo,et al. Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs , 2015, IEEE Transactions on Parallel and Distributed Systems.
[28] K. J. Ray Liu,et al. Evolutionary cooperative spectrum sensing game: how to collaborate? , 2010, IEEE Transactions on Communications.
[29] Mérouane Debbah,et al. Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[30] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[31] Lajos Hanzo,et al. Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.