Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted
暂无分享,去创建一个
Kaizhi Huang | Zhou Zhong | Xinsheng Ji | Xiaolei Kang | Xinsheng Ji | Kaizhi Huang | Zhou Zhong | Xiaolei Kang
[1] Xiaofeng Tao,et al. Artificial Noise Assisted Communication in the Multiuser Downlink: Optimal Power Allocation , 2015, IEEE Communications Letters.
[2] Athina P. Petropulu,et al. On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.
[3] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[4] Geoffrey Ye Li,et al. Decentralized interference coordination for D2D communication underlying cellular Networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[5] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[6] Suili Feng,et al. Interference pricing for device-to-device communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[9] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[10] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[11] Rodney A. Kennedy,et al. Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[12] Zhu Han,et al. Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[13] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[14] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[15] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[16] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[17] Jeffrey G. Andrews,et al. Distributed Resource Allocation in Device-to-Device Enhanced Cellular Networks , 2014, IEEE Transactions on Communications.
[18] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[19] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.