Analyzing energy efficient physical layer security in large-scale MIMO enabled CRN with QoS requirements
暂无分享,去创建一个
[1] Mustafa Cenk Gursoy,et al. Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.
[2] Pramod Viswanath,et al. Optimal sequences, power control and capacity of spread spectrum systems with multiuser linear recei , 1968 .
[3] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[4] Lifeng Wang,et al. Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[5] Erik G. Larsson,et al. Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.
[6] Sachin Shetty,et al. Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems , 2016, IEEE Systems Journal.
[7] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[8] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[9] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[10] Danda B. Rawat. ROAR: An architecture for Real-Time Opportunistic Spectrum Access in Cloud-assisted Cognitive Radio Networks , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[11] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[12] Danda B. Rawat,et al. A novel algorithm for secrecy rate analysis in massive MIMO system with target SINR requirements , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[13] Adeel Razi,et al. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.
[14] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[15] Sachin Shetty,et al. Dynamic Spectrum Access for Wireless Networks , 2015, SpringerBriefs in Electrical and Computer Engineering.
[16] Derrick Wing Kwan Ng,et al. Secure Massive MIMO transmission in the presence of an active eavesdropper , 2015, 2015 IEEE International Conference on Communications (ICC).
[17] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[18] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[19] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[20] Thomas L. Marzetta,et al. Pilot Contamination and Precoding in Multi-Cell TDD Systems , 2009, IEEE Transactions on Wireless Communications.
[21] Thomas L. Marzetta,et al. Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.
[22] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[23] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[24] Yu-Dong Yao,et al. Opportunistic Distributed Space-Time Coding for Decode-and-Forward Cooperation Systems , 2012, IEEE Transactions on Signal Processing.
[25] Sabina Jeschke,et al. Industrial Internet of Things: Cybermanufacturing Systems , 2016 .
[26] Mérouane Debbah,et al. Massive MIMO: How many antennas do we need? , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[27] Erik G. Larsson,et al. Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..
[28] Brian M. Sadler,et al. Cognitive Medium Access: Constraining Interference Based on Experimental Models , 2008, IEEE Journal on Selected Areas in Communications.
[29] Jing Huang,et al. Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.
[30] Nathaniel E. Helwig,et al. An Introduction to Linear Algebra , 2006 .
[31] Erik G. Larsson,et al. Energy and Spectral Efficiency of Very Large Multiuser MIMO Systems , 2011, IEEE Transactions on Communications.
[32] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[33] Danda B. Rawat,et al. Cyber-Physical Systems: From Theory to Practice , 2015 .
[34] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.