Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference
暂无分享,去创建一个
George K. Karagiannidis | Trung Quang Duong | Nan Yang | Xianfu Lei | Lisheng Fan | G. Karagiannidis | Nan Yang | T. Duong | Xianfu Lei | Lisheng Fan
[1] Holger Boche,et al. ON SCHUR-CONVEXITY OF EXPECTATION OF WEIGHTED SUM OF RANDOM VARIABLES WITH APPLICATIONS , 2004 .
[2] Caijun Zhong,et al. Ergodic Capacity Comparison of Different Relay Precoding Schemes in Dual-Hop AF Systems With Co-Channel Interference , 2014, IEEE Transactions on Communications.
[3] George K. Karagiannidis,et al. Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.
[4] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[5] A. Lee Swindlehurst,et al. IEEE Journal of Selected Topics in Signal Processing Inaugural Issue: [editor-in-chief's message] , 2007, J. Sel. Topics Signal Processing.
[6] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[7] Kenneth W. Shum,et al. Data Dissemination With Side Information and Feedback , 2014, IEEE Transactions on Wireless Communications.
[8] Jack M. Winters,et al. Optimum Combining in Digital Mobile Radio with Cochannel Interference , 1984, IEEE Journal on Selected Areas in Communications.
[9] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[10] Hyundong Shin,et al. Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.
[11] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.
[12] Chi Wan Sung,et al. Linear Network Coding Strategies for the Multiple Access Relay Channel with Packet Erasures , 2013, IEEE Transactions on Wireless Communications.
[13] Walaa Hamouda,et al. Outage analysis of relay selection in AF with outdated channel information in the presence of co-channel interference , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[14] Tran Trung Duy,et al. Secrecy performance analysis with relay selection methods under impact of co-channel interference , 2015, IET Commun..
[15] Mandy Eberhart,et al. Digital Communication Over Fading Channels , 2016 .
[16] A. G. Williamson,et al. Outage probability calculations for mobile radio systems with multiple interferers , 1988 .
[17] Jiaheng Wang,et al. Performance of Secure Communications Over Correlated Fading Channels , 2012, IEEE Signal Processing Letters.
[18] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[19] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[20] Tao Zhang,et al. Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.
[21] Shi Jin,et al. Ergodic Rate Analysis for Multipair Massive MIMO Two-Way Relay Networks , 2015, IEEE Transactions on Wireless Communications.
[22] Caijun Zhong,et al. Dual-hop systems with noisy relay and interference-limited destination , 2010, IEEE Transactions on Communications.
[23] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[24] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[25] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[26] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[27] ShengPing Li,et al. An adaptive control with optimal disturbances rejection , 2011, Science China Information Sciences.
[28] George K. Karagiannidis,et al. Secure Switch-and-Stay Combining (SSSC) for Cognitive Relay Networks , 2016, IEEE Transactions on Communications.
[29] Alexander M. Haimovich,et al. Performance analysis of optimum combining in wireless communications with Rayleigh fading and cochannel interference , 1998, IEEE Trans. Commun..
[30] Mérouane Debbah,et al. Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[31] Caijun Zhong,et al. Outage Probability of Dual-Hop Multiple Antenna AF Systems with Linear Processing in the Presence of Co-Channel Interference , 2014, IEEE Transactions on Wireless Communications.
[32] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[33] Tharmalingam Ratnarajah,et al. Secure Communication through Nakagami-m Fading MISO Channel , 2011, 2011 IEEE International Conference on Communications (ICC).
[34] Caijun Zhong,et al. Ergodic Capacity Analysis of Amplify-and-Forward MIMO Dual-Hop Systems , 2008, IEEE Transactions on Information Theory.
[35] Sheng-Ping Li. Robust adaptive control of uncertain systems with guaranteed robust stability and asymptotic performance , 2011, Int. J. Syst. Sci..
[36] George K. Karagiannidis,et al. Amplify-and-Forward Relay Selection with Outdated Channel Estimates , 2012, IEEE Transactions on Communications.
[37] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.