On Secrecy Analysis for D2D Networks over alpha-µ Fading Channels with Randomly Distributed Eavesdroppers
暂无分享,去创建一个
Georges Kaddoum | Satyanarayana Vuppala | Long Kong | L. Kong | Satyanarayana Vuppala | Georges Kaddoum
[1] I. S. Ansari,et al. Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.
[2] L. Debnath,et al. Integral Transforms and Their Applications, Second Edition , 2006 .
[3] Georges Kaddoum,et al. Performance analysis of physical layer security over α–μ fading channel , 2016 .
[4] Martin Haenggi,et al. Stochastic Geometry for Wireless Networks , 2012 .
[5] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[6] Kostas Dangakis,et al. Simple, accurate formula for the average bit error probability of multiple-input multiple-output free-space optical links over negative exponential turbulence channels. , 2012, Optics letters.
[7] Tharmalingam Ratnarajah,et al. Secrecy outage in correlated Nakagami-m fading channels , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[8] Lin Wang,et al. Secrecy Analysis of a MIMO Full-Duplex Active Eavesdropper with Channel Estimation Errors , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[9] Hyundong Shin,et al. Multicasting in Stochastic MIMO Networks , 2014, IEEE Transactions on Wireless Communications.
[10] Satyanarayana Vuppala,et al. Secrecy-Rate Analysis in Multitier Heterogeneous Networks Under Generalized Fading Model , 2017, IEEE Internet of Things Journal.
[11] Simon L. Cotton,et al. Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..
[12] Arak M. Mathai,et al. The H-Function with Applications in Statistics and Other Disciplines. , 1981 .
[13] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[14] Tharmalingam Ratnarajah,et al. On the security region of best source indices in random wireless networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[15] Gongpu Wang,et al. Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.
[16] Justin P. Coon,et al. Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[17] Donald F. Towsley,et al. Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.