Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications
暂无分享,去创建一个
Zhiguo Ding | K. Cumanan | Mai Xu | Zheng Chu | Z. Ding | Zheng Chu | K. Cumanan | Mai Xu
[1] Haibo Wang,et al. Distance-constrained resource-sharing criteria for device-to-device communications underlaying cellular networks , 2012 .
[2] Wenbo Wang,et al. Interference Constrained D2D Communication with Relay Underlaying Cellular Networks , 2013, 2013 IEEE 78th Vehicular Technology Conference (VTC Fall).
[3] Zhu Han,et al. Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[4] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[5] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[6] Xiaoying Gan,et al. Secrecy-based channel assignment for device-to-device communication: An auction approach , 2013, 2013 International Conference on Wireless Communications and Signal Processing.
[7] Bayan S. Sharif,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.
[8] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[9] Sungsoo Park,et al. Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.
[10] A. Lee Swindlehurst,et al. Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.
[11] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[12] Carl Wijting,et al. Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.
[13] Björn E. Ottersten,et al. Robust Cognitive Beamforming With Bounded Channel Uncertainties , 2009, IEEE Transactions on Signal Processing.
[14] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[15] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[16] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[17] Shuguang Cui,et al. On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[18] Kin K. Leung,et al. Impact of Imperfect Channel State Information on Bi-Directional Communications With Relay Selection , 2011, IEEE Transactions on Signal Processing.
[19] Tung-Sang Ng,et al. Energy-efficient multiuser SIMO: achieving probabilistic robustness with gaussian channel uncertainty , 2009, IEEE Transactions on Communications.
[20] Qiang Li,et al. A Safe Approximation Approach to Secrecy Outage Design for MIMO Wiretap Channels , 2014, IEEE Signal Processing Letters.
[21] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[22] K. Cumanan,et al. Robust interference control techniques for cognitive radios using worst-case performance optimization , 2008, 2008 International Symposium on Information Theory and Its Applications.
[23] Qiang Li,et al. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.
[24] K. Cumanan,et al. A Robust Beamforming Based Interference Control Technique and its Performance for Cognitive Radios , 2008, 2008 International Symposium on Communications and Information Technologies.
[25] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[26] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..
[27] Lingyang Song,et al. Resource Management for Device-to-Device Underlay Communication , 2013, SpringerBriefs in Computer Science.
[28] Sungsoo Park,et al. Reliability Improvement Using Receive Mode Selection in the Device-to-Device Uplink Period Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.
[29] Nikos D. Sidiropoulos,et al. Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.
[30] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.