On the Achievable Transmission Capacity of Secrecy-Based D2D Cellular Networks
暂无分享,去创建一个
[1] Mauro Conti,et al. Secure Message Delivery Games for Device-to-Device Communications , 2014, GameSec.
[2] Tobias J. Oechtering,et al. Privacy-Aware Distributed Bayesian Detection , 2015, IEEE Journal of Selected Topics in Signal Processing.
[3] Ekram Hossain,et al. Cognitive and Energy Harvesting-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis , 2014, IEEE Transactions on Communications.
[4] Jeffrey G. Andrews,et al. Spectrum Sharing for Device-to-Device Communication in Cellular Networks , 2013, IEEE Transactions on Wireless Communications.
[5] Zheng Yan,et al. Security in D2D Communications: A Review , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[6] Samee Ullah Khan,et al. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding , 2013, IEEE Transactions on Wireless Communications.
[7] Hao Chen,et al. Optimal resource allocation for sensing-based spectrum sharing D2D networks , 2015, Comput. Electr. Eng..
[8] Geoffrey Ye Li,et al. Device-to-device communications in cellular networks , 2016, IEEE Communications Magazine.
[9] Hao Chen,et al. Resource allocation for sensing-based device-to-device (D2D) networks , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.
[10] Mohamed-Slim Alouini,et al. Analytical Modeling of Mode Selection and Power Control for Underlay D2D Communication in Cellular Networks , 2014, IEEE Transactions on Communications.
[11] Hao Chen,et al. Spatial Spectrum Sensing-Based Device-to-Device Cellular Networks , 2016, IEEE Transactions on Wireless Communications.
[12] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[13] Aiqing Zhang,et al. SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.
[14] Jeffrey G. Andrews,et al. Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis , 2013, IEEE Journal on Selected Areas in Communications.
[15] Raed A. Abd-Alhameed,et al. Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.
[16] Trung Quang Duong,et al. Secure D2D communication in large-scale cognitive cellular networks with wireless power transfer , 2015, 2015 IEEE International Conference on Communications (ICC).
[17] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[18] Li Sun,et al. Dynamic RACH Partition for Massive Access of Differentiated M2M Services , 2016, Sensors.
[19] Gary Steri,et al. Connectivity and security in a D2D communication protocol for public safety applications , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).
[20] Xiangyun Zhou,et al. Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.
[21] Stefan Parkvall,et al. Device-to-Device Communications for National Security and Public Safety , 2014, IEEE Access.
[22] Jeffrey G. Andrews,et al. Analytical Modeling of Uplink Cellular Networks , 2012, IEEE Transactions on Wireless Communications.
[23] Martin Haenggi,et al. Stochastic Geometry for Modeling, Analysis, and Design of Multi-Tier and Cognitive Cellular Wireless Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[24] Nei Kato,et al. Relay-by-smartphone: realizing multihop device-to-device communications , 2014, IEEE Communications Magazine.
[25] Jeffrey G. Andrews,et al. A Comprehensive Framework for Device-to-Device Communications in Cellular Networks , 2013, ArXiv.
[26] Wei Xu,et al. Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).