Large-scale antennas analysis of untrusted relay system with cooperative jamming
暂无分享,去创建一个
[1] Qian Yang,et al. Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers , 2016, IEEE Transactions on Wireless Communications.
[2] Adrish Banerjee,et al. Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[3] Babak Hassibi,et al. On the capacity of MIMO broadcast channels with partial side information , 2005, IEEE Transactions on Information Theory.
[4] Jinhong Yuan,et al. Antenna switching for security enhancement in full-duplex wiretap channels , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[5] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[6] Abbas Mohammadi,et al. Destination-based cooperative jamming in untrusted amplify-and-forward relay networks: resource allocation and performance study , 2016, IET Commun..
[7] Yu Gong,et al. Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.
[8] Athanasios V. Vasilakos,et al. Full duplex techniques for 5G networks: self-interference cancellation, protocol design, and relay selection , 2015, IEEE Communications Magazine.
[9] Yongming Huang,et al. Ergodic Achievable Secrecy Rate of Multiple-Antenna Relay Systems With Cooperative Jamming , 2016, IEEE Transactions on Wireless Communications.
[10] Qian Yang,et al. Secure transmissions in wireless ad hoc networks using hybrid half and full duplex receivers , 2017, 2017 IEEE International Conference on Communications (ICC).
[11] Risto Wichman,et al. In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.
[12] Zhi Chen,et al. A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.
[13] Joseph Lipka,et al. A Table of Integrals , 2010 .
[14] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[15] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[16] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[17] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[18] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[19] Xuelong Li,et al. Simultaneous Bidirectional Link Selection in Full Duplex MIMO Systems , 2015, IEEE Transactions on Wireless Communications.
[20] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[21] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.