On the security of cooperative cognitive radio networks with distributed beamforming
暂无分享,去创建一个
Yueming Cai | Xiaoming Xu | Yuzhen Huang | Weiwei Yang | Kaihua Wang | Weifeng Mou | Yueming Cai | Xiaoming Xu | Weiwei Yang | Yu-zhen Huang | Weifeng Mou | Kaihua Wang
[1] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[2] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[3] R. Pavur,et al. Quadratic forms involving the complex Gaussian , 1980 .
[4] Gaofeng Pan,et al. Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.
[5] Tran Trung Duy,et al. Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Ali Ghrayeb,et al. On the Performance of Cooperative Relaying Spectrum-Sharing Systems with Collaborative Distributed Beamforming , 2014, IEEE Transactions on Communications.
[8] Aydin Behnad,et al. Accuracy of Harmonic Mean Approximation in Performance Analysis of Multihop Amplify-and-Forward Relaying , 2014, IEEE Wireless Communications Letters.
[9] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[10] Yunfei Chen,et al. Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.
[11] Jun Zhou,et al. Secure transmission for AF relaying spectrum-sharing systems with collaborative distributed beamforming , 2016, 2016 25th Wireless and Optical Communication Conference (WOCC).
[12] Wei-Ping Zhu,et al. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.
[13] Wei Liang. Cooperative communication for cognitive radio networks , 2015 .
[14] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[15] Jiasong Mu,et al. Throat polyp detection based on compressed big data of voice with support vector machine algorithm , 2014, EURASIP Journal on Advances in Signal Processing.
[16] Huan Zhang,et al. Secrecy Outage Performance for SIMO Underlay Cognitive Radio Systems With Generalized Selection Combining Over Nakagami-$m$ Channels , 2016, IEEE Transactions on Vehicular Technology.
[17] Yueming Cai,et al. Secrecy outage analysis for cooperative DF underlay CRNs with outdated CSI , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[18] Hsiao-Hwa Chen,et al. Cooperative Communications for Cognitive Radio Networks — From Theory to Applications , 2014, IEEE Communications Surveys & Tutorials.
[19] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[20] Mugen Peng,et al. Security-reliability performance of cognitive AF relay-based wireless communication system with channel estimation error , 2014, EURASIP Journal on Advances in Signal Processing.
[21] Liuqing Yang,et al. Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.
[22] George K. Karagiannidis,et al. On the Security of Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.