A Game-Theoretical Modelling Approach for Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access System
暂无分享,去创建一个
Chee Yen Leow | Sharul Kamal Abdul Rahim | Yamen Alsaba | C. Leow | S. K. Abdul Rahim | Yamen Alsaba
[1] Zhiguo Ding,et al. Nonorthogonal Multiple Access for 5G , 2018, 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management.
[2] Mohamed-Slim Alouini,et al. On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.
[3] Salman Durrani,et al. Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.
[4] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[5] Miao Pan,et al. Joint Sensing Duration Adaptation, User Matching, and Power Allocation for Cognitive OFDM-NOMA Systems , 2018, IEEE Transactions on Wireless Communications.
[6] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[7] Arumugam Nallanathan,et al. Enhancing Secrecy Rate in Cognitive Radio Networks via Multilevel Stackelberg Game , 2016, IEEE Communications Letters.
[8] Qi Zhang,et al. Price-Based Power Allocation for Non-Orthogonal Multiple Access Systems , 2016, IEEE Wireless Communications Letters.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Xianbin Wang,et al. Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication , 2018, IEEE Transactions on Vehicular Technology.
[11] Chee Yen Leow,et al. A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case , 2018, IEEE Access.
[12] Qi Zhang,et al. Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.
[13] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[14] Zhiguo Ding,et al. Performance Analysis and Optimization for SWIPT Wireless Sensor Networks , 2017, IEEE Transactions on Communications.
[15] Anass Benjebbour,et al. System-level performance evaluation of downlink non-orthogonal multiple access (NOMA) , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[16] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[17] Adnan Yazici,et al. Secure Wireless Powered and Cooperative Jamming D2D Communications , 2018, IEEE Transactions on Green Communications and Networking.
[18] Li Xu,et al. Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme , 2018, IEEE Transactions on Information Forensics and Security.
[19] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[20] Giuseppe Caire,et al. Game Theory-Based Resource Allocation for Secure WPCN Multiantenna Multicasting Systems , 2018, IEEE Transactions on Information Forensics and Security.
[21] Xiuzhen Cheng,et al. Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.
[22] Theofilos Chrysikos,et al. Wireless Information-Theoretic Security in MANETs , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).
[23] Adnan Yazici,et al. Game theory based secure wireless powered D2D communications with cooperative jamming , 2017, 2017 Wireless Days.
[24] Chen He,et al. Optimal Price-Based Power Control Algorithm in Cognitive Radio Networks , 2014, IEEE Transactions on Wireless Communications.
[25] Kai-Kit Wong,et al. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.
[26] Huiling Jiang,et al. System-level performance of downlink NOMA combined with SU-MIMO for future LTE enhancements , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[27] Chee Yen Leow,et al. Full-Duplex Cooperative Non-Orthogonal Multiple Access With Beamforming and Energy Harvesting , 2018, IEEE Access.
[28] Benjamin Friedlander,et al. Performance analysis of a null-steering algorithm based on direction-of-arrival estimation , 1989, IEEE Trans. Acoust. Speech Signal Process..
[29] Mehul Motani,et al. Price-Based Resource Allocation for Spectrum-Sharing Femtocell Networks: A Stackelberg Game Approach , 2012, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[30] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[31] Drew Fudenberg,et al. Game theory (3. pr.) , 1991 .
[32] Yue Gao,et al. Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[33] Erik G. Larsson,et al. Competition Versus Cooperation on the MISO Interference Channel , 2008, IEEE Journal on Selected Areas in Communications.