Secure Cognitive MIMO Wiretap Networks With Different Antenna Transmission Schemes
暂无分享,去创建一个
[1] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[2] Zan Li,et al. On the Performance of Spectrum Sharing Cognitive Relay Networks with Imperfect CSI , 2012, IEEE Communications Letters.
[3] Nan Yang,et al. Secrecy outage on transmit antenna selection/maximal ratio combining in MIMO cognitive radio networks , 2016, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[4] Ho Van Khuong. Exact Outage Analysis of Underlay Cooperative Cognitive Networks with Reactive Relay Selection Under Imperfect Channel Information , 2015, Wirel. Pers. Commun..
[5] Mohamed-Slim Alouini,et al. On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.
[6] Xiaodong Ji,et al. Security-Reliability Tradeoff Analysis for Underlay Cognitive Two-Way Relay Networks , 2019, IEEE Transactions on Wireless Communications.
[7] Ertugrul Basar,et al. Index modulation techniques for 5G wireless networks , 2016, IEEE Communications Magazine.
[8] Xing Zhang,et al. Performance analysis of cognitive relay networks with imperfect channel knowledge over Nakagami-m fading channels , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[9] Insoo Koo,et al. A Novel Physical Layer Security Scheme in OFDM-Based Cognitive Radio Networks , 2018, IEEE Access.
[10] Shuangqing Wei,et al. Diversity–Multiplexing Tradeoff of Asynchronous Cooperative Diversity in Wireless Networks , 2007, IEEE Transactions on Information Theory.
[11] Trung Quang Duong,et al. Physical Layer Security With Threshold-Based Multiuser Scheduling in Multi-Antenna Wireless Networks , 2016, IEEE Transactions on Communications.
[12] Tao Zhang,et al. Secure Multiantenna Cognitive Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.
[13] Caijun Zhong,et al. Cognitive MIMO Relaying Networks With Primary User's Interference and Outdated Channel State Information , 2014, IEEE Transactions on Communications.
[14] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.
[15] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[16] Yueming Cai,et al. A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.
[17] Yahong Rosa Zheng,et al. Multiantenna Secure Cognitive Radio Networks With Finite-Alphabet Inputs: A Global Optimization Approach for Precoder Design , 2016, IEEE Transactions on Wireless Communications.
[18] Tao Zhang,et al. Secure Transmission for Differential Quadrature Spatial Modulation With Artificial Noise , 2019, IEEE Access.
[19] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[20] Moon Ho Lee,et al. Enhancing Security of Primary User in Underlay Cognitive Radio Networks With Secondary User Selection , 2018, IEEE Access.
[21] Tao Zhang,et al. Secure Transmission in Cognitive MIMO Relaying Networks With Outdated Channel State Information , 2016, IEEE Access.
[22] Yueming Cai,et al. Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.
[23] Walaa Hamouda,et al. Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and Applications , 2017, IEEE Communications Surveys & Tutorials.
[24] Haji M. Furqan,et al. Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.
[25] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[26] Mohamed-Slim Alouini,et al. Secrecy performance analysis of SIMO underlay cognitive radio systems with outdated CSI , 2017, IET Commun..
[27] Mohamed-Slim Alouini,et al. On Secure Mixed RF-FSO Systems With TAS and Imperfect CSI , 2018, IEEE Transactions on Communications.
[28] Il-Min Kim,et al. Diversity order analysis of the decode-and-forward cooperative networks with relay selection , 2007, IEEE Transactions on Wireless Communications.
[29] Hong Wen,et al. A framework of the PHY-layer approach to defense against security threats in cognitive radio networks , 2013, IEEE Network.
[30] Xiang Cheng,et al. Differential Spatial Modulation , 2015, IEEE Transactions on Vehicular Technology.
[31] Bo Wang,et al. Artificial-Noise-Aided Beamforming Design in the MISOME Wiretap Channel Under the Secrecy Outage Probability Constraint , 2017, IEEE Transactions on Wireless Communications.
[32] Imran Shafique Ansari,et al. Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels , 2017, IEEE Transactions on Vehicular Technology.
[33] Moe Z. Win,et al. Performance of RAKE reception in dense multipath channels: implications of spreading bandwidth and selection diversity order , 2000, IEEE Journal on Selected Areas in Communications.
[34] Xiuzhen Cheng,et al. Dynamic spectrum access: from cognitive radio to network radio , 2012, IEEE Wireless Communications.
[35] Fengchao Zhu,et al. Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming , 2016, IEEE Transactions on Vehicular Technology.
[36] Evelio Fernandez,et al. Physical Layer Security in Cognitive Radio Networks Using Improper Gaussian Signaling , 2018, IEEE Communications Letters.
[37] Harald Haas,et al. Spatial Modulation , 2008, IEEE Transactions on Vehicular Technology.