Secrecy Outage and Diversity Analysis of Cognitive Radio Systems
暂无分享,去创建一个
[1] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[2] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[3] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[4] Lizhong Zheng,et al. Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.
[5] Abhay Parekh,et al. Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.
[6] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[7] Yonghong Zeng,et al. Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Transactions on Wireless Communications.
[8] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[9] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[10] Ying-Chang Liang,et al. On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009 .
[11] Shuguang Cui,et al. On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Jeffrey G. Andrews,et al. Outage Probability of Cognitive Relay Networks with Interference Constraints , 2011, IEEE Transactions on Wireless Communications.
[13] Cognitive Transmissions with Multiple Relays in Cognitive Radio Networks , 2011, IEEE Transactions on Wireless Communications.
[14] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[15] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[16] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[17] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[18] Daniel Benevides da Costa,et al. Cognitive Amplify-and-Forward Relay Networks Over Nakagami- $m$ Fading , 2012, IEEE Transactions on Vehicular Technology.
[19] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in Cognitive Radio networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[20] Yu-Dong Yao,et al. Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions , 2012, IEEE Communications Magazine.
[21] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[22] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[23] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[24] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[25] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[26] Mohamed-Slim Alouini,et al. Outage Analysis for Underlay Cognitive Networks Using Incremental Regenerative Relaying , 2013, IEEE Transactions on Vehicular Technology.
[27] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.