A Novel Cooperative Jamming Scheme for Wireless Social Networks Without Known CSI
暂无分享,去创建一个
Chunqiang Hu | Xin Fan | Liang Huang | Yan Huo | Jin Qian | Yuqian Tian | Jinlong Qian | Yan Huo | Xin Fan | Chun-qiang Hu | Yuqi Tian | Liang Huang
[1] Mikael Skoglund,et al. Multi-Phase Smart Relaying and Cooperative Jamming in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Cognitive Communications and Networking.
[2] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[3] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.
[4] Mirko Krivánek,et al. Simulated Annealing: A Proof of Convergence , 1994, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Xiaoshuang Xing,et al. Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[6] Shlomo Shamai,et al. The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.
[7] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[8] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[9] Peng Ning,et al. Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time , 2013, 2013 IEEE Symposium on Security and Privacy.
[10] Zhen Li,et al. Worst-Case Jamming for Secure Communications in Multi-antenna Cooperative Cognitive Radio Networks with Energy Harvesting , 2015, 2015 International Conference on Identification, Information, and Knowledge in the Internet of Things (IIKI).
[11] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[12] Zhen Li,et al. Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[13] Xianbin Wang,et al. Security enhancement in cooperative jamming using compromised secrecy region minimization , 2013, 2013 13th Canadian Workshop on Information Theory.
[14] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[15] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[16] Jianzhong Li,et al. Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[17] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[18] R. York,et al. Coupled-oscillator arrays for millimeter-wave power-combining and mode-locking , 1992, 1992 IEEE Microwave Symposium Digest MTT-S.
[19] Pei Liu,et al. Cooperative wireless communications: a cross-layer approach , 2006, IEEE Wireless Communications.
[20] Akbar Rahman,et al. Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[21] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[22] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[23] Xiuzhen Cheng,et al. Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[24] Bo Wang,et al. On the Secrecy Rate Maximization With Uncoordinated Cooperative Jamming by Single-Antenna Helpers , 2017, IEEE Transactions on Vehicular Technology.
[25] Peter Rossmanith,et al. Simulated Annealing , 2008, Taschenbuch der Algorithmen.
[26] Kathryn A. Dowsland,et al. Simulated Annealing , 1989, Encyclopedia of GIS.
[27] Zhen Li,et al. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.
[28] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[29] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[30] Xiaoshuang Xing,et al. Joint design of jammer selection and beamforming for securing MIMO cooperative cognitive radio networks , 2017, IET Commun..
[31] Zhipeng Cai,et al. FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.
[32] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.