Secrecy Outage and Diversity Analysis in D2D-Enabled Cellular Networks
暂无分享,去创建一个
[1] Jian Liu,et al. QoS-based device-to-device communication schemes in heterogeneous wireless networks , 2015, IET Commun..
[2] Xiaoying Gan,et al. Secrecy-based channel assignment for device-to-device communication: An auction approach , 2013, 2013 International Conference on Wireless Communications and Signal Processing.
[3] Hans-Jürgen Zepernick,et al. On physical layer security for cognitive radio networks with primary user interference , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[4] Qihui Wu,et al. Cellular-Base-Station-Assisted Device-to-Device Communications in TV White Space , 2015, IEEE Journal on Selected Areas in Communications.
[5] Li Sun,et al. Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation , 2016, IEEE Transactions on Vehicular Technology.
[6] Wei Xu,et al. Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[7] Yong Liu,et al. Resource management for interference mitigation in device-to-device communication , 2015, IET Commun..
[8] Raed A. Abd-Alhameed,et al. Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.
[9] Zhiguo Ding,et al. Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..
[10] Huiming Wang,et al. Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.
[11] Rodney A. Kennedy,et al. Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[12] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[13] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[14] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[15] Bhaskar D. Rao,et al. Transmit beamforming in multiple-antenna systems with finite rate feedback: a VQ-based approach , 2006, IEEE Transactions on Information Theory.
[16] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[17] Zhu Han,et al. Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[18] Olav Tirkkonen,et al. Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..
[19] Hongbo Zhu,et al. Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels , 2016, IEEE Transactions on Information Forensics and Security.