Rank-Based Secrecy Rate Improvement Using NOMA for Ultra Dense Network
暂无分享,去创建一个
[1] Ying Wang,et al. Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study , 2016, IEEE Access.
[2] Xianbin Wang,et al. Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.
[3] Song Guo,et al. D2D-based content delivery with parked vehicles in vehicular social networks , 2016, IEEE Wireless Communications.
[4] Zhi Chen,et al. Secrecy Performance Analysis in Downlink NOMA Systems with Cooperative Full-Duplex Relaying , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[5] Anass Benjebbour,et al. Design considerations for a 5G network architecture , 2014, IEEE Communications Magazine.
[6] Jeffrey G. Andrews,et al. What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.
[7] H. Vincent Poor,et al. On the Sum Rate of MIMO-NOMA and MIMO-OMA Systems , 2017, IEEE Wireless Communications Letters.
[8] Xianda Zhang,et al. Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.
[9] Mohamed-Slim Alouini,et al. Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.
[10] Günes Karabulut-Kurt,et al. Nonorthogonal Multiple Access for 5G and Beyond , 2018, Wirel. Commun. Mob. Comput..
[11] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[12] Leandro N. Balico,et al. Localization Prediction in Vehicular Ad Hoc Networks , 2018, IEEE Communications Surveys & Tutorials.
[13] Garima Chopra,et al. A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions , 2017, J. Netw. Comput. Appl..
[14] Wen-Jun Lu,et al. A Closed-Form and Stochastic Wall Insertion Loss Model for Dense Small Cell Networks , 2018, IEEE Access.
[15] H. Vincent Poor,et al. Cooperative Non-orthogonal Multiple Access With Simultaneous Wireless Information and Power Transfer , 2015, IEEE Journal on Selected Areas in Communications.
[16] Walaa Hamouda,et al. Physical Layer Security in Ultra-Dense Networks , 2017, IEEE Wireless Communications Letters.
[17] H. Vincent Poor,et al. Random Beamforming in Millimeter-Wave NOMA Networks , 2016, IEEE Access.
[18] Xuemin Shen,et al. Cloud assisted HetNets toward 5G wireless networks , 2015, IEEE Communications Magazine.
[19] Garima Chopra,et al. TPA: Prediction of Spoofing Attack Using Thermal Pattern Analysis in Ultra Dense Network for High Speed Handover Scenario , 2018, IEEE Access.
[20] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[21] Nhu Tri Do,et al. A BNBF User Selection Scheme for NOMA-Based Cooperative Relaying Systems With SWIPT , 2017, IEEE Communications Letters.
[22] Victor C. M. Leung,et al. Coverage Analysis of Max-SIR Cell Association in HetNets Under Nakagami Fading , 2018, IEEE Transactions on Vehicular Technology.
[23] Hui Tian,et al. Social-aware energy harvesting device-to-device communications in 5G networks , 2016, IEEE Wireless Communications.
[24] Garima Chopra,et al. Possible Security Attack Modeling in Ultradense Networks Using High-Speed Handover Management , 2018, IEEE Transactions on Vehicular Technology.
[25] Ming Xiao,et al. A Survey of Advanced Techniques for Spectrum Sharing in 5G Networks , 2017, IEEE Wireless Communications.
[26] Qiang Li,et al. Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.
[27] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[28] Ming Xiao,et al. Performance Analysis and Optimization in Downlink NOMA Systems With Cooperative Full-Duplex Relaying , 2017, IEEE Journal on Selected Areas in Communications.
[29] Amr M. Youssef,et al. Ultra-Dense Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[30] Mohamed-Slim Alouini,et al. Non-Orthogonal Multiple Access for Large-Scale 5G Networks: Interference Aware Design , 2017, IEEE Access.
[31] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[32] H. Vincent Poor,et al. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.
[33] Tharek Abd Rahman,et al. Path loss and RMS delay spread model for 5G channel at 19 GHz , 2017, 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA).
[34] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[35] Sanjeev Jain,et al. Novel Beamforming Approach for Secure Communication in UDN to Maximize Secrecy Rate and Fairness Security Assessment , 2019, IEEE Internet of Things Journal.
[36] Octavia A. Dobre,et al. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[37] Mohamad Yassin,et al. A survey of positioning techniques and location based services in wireless networks , 2015, 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES).