Secrecy and End-to-End Analyses Employing Opportunistic Relays Under Outdated Channel State Information and Dual Correlated Rayleigh Fading
暂无分享,去创建一个
[1] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[2] David Haccoun,et al. Capacity Analysis of Opportunistic Relaying in Cooperative Systems with Outdated Channel Information , 2010, IEEE Communications Letters.
[3] Imran Shafique Ansari,et al. Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels , 2017, IEEE Transactions on Vehicular Technology.
[4] Nadeem Javaid,et al. Buffer size and link quality based cooperative relay selection in wireless networks , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[5] Yajun Zhang,et al. Secure performance analysis of buffer-aided cognitive relay networks , 2015, 2015 IEEE International Conference on Computer and Communications (ICCC).
[6] Robert Schober,et al. Max-Max Relay Selection for Relays with Buffers , 2012, IEEE Transactions on Wireless Communications.
[7] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[8] Caijun Zhong,et al. Secure Transmission in Cooperative Relaying Networks With Multiple Antennas , 2016, IEEE Transactions on Wireless Communications.
[9] H. Vincent Poor,et al. Secrecy Rate Beamforming for Multicell Networks With Information and Energy Harvesting , 2017, IEEE Transactions on Signal Processing.
[10] D. Haccoun,et al. Relay Selection in AF Cooperative Systems: An Overview , 2012, IEEE Vehicular Technology Magazine.
[11] G. Wornell,et al. Secure Transmission with Multiple Antennas: The MIMOME Channel , 2008 .
[12] Simon L. Cotton,et al. Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..
[13] George K. Karagiannidis,et al. Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.
[14] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[15] H. Vincent Poor,et al. Buffering in a Three-Node Relay Network , 2008, IEEE Transactions on Wireless Communications.
[16] D. F. Hays,et al. Table of Integrals, Series, and Products , 1966 .
[17] Wessam Ajib,et al. Performance Analysis of Amplify-and-Forward Cooperative Networks with Relay Selection over Rayleigh Fading Channels , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[18] J. Gurland. Multidimensional Gaussian Distributions (Kenneth S. Miller) , 1966 .
[19] Hao Zhang,et al. Performance analysis of IAF relaying mobile D2D cooperative networks , 2017, J. Frankl. Inst..
[20] Adrish Banerjee,et al. Secure Communication via a Wireless Energy Harvesting Untrusted Relay , 2015, IEEE Transactions on Vehicular Technology.
[21] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[22] Yun Liu,et al. Outage Performance for IDF Relaying Mobile Cooperative Networks , 2017, 5GWN.
[23] Mahtab Mirmohseni,et al. Secrecy Capacity Scaling in Large Cooperative Wireless Networks , 2013, IEEE Transactions on Information Theory.
[24] Norman C. Beaulieu,et al. Novel Simple Representations for Gaussian Class Multivariate Distributions With Generalized Correlation , 2011, IEEE Transactions on Information Theory.
[25] Mohamed-Slim Alouini,et al. On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks Over Nakagami- $m$ Fading Channels , 2017, IEEE Transactions on Cognitive Communications and Networking.
[26] I. S. Ansari,et al. Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.
[27] Li Wang,et al. Cooperative Jamming-Aided Secrecy Enhancement in P2P Communications With Social Interaction Constraints , 2017, IEEE Transactions on Vehicular Technology.
[28] Chintha Tellambura,et al. Distribution functions of selection combiner output in equally correlated Rayleigh, Rician, and Nakagami-m fading channels , 2004, IEEE Transactions on Communications.
[29] Inkyu Lee,et al. Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer , 2017, IEEE Transactions on Communications.
[30] Yu Gong,et al. Decode-and-Forward Buffer-Aided Relay Selection in Cognitive Relay Networks , 2014, IEEE Transactions on Vehicular Technology.
[31] Jiaheng Wang,et al. Performance of Secure Communications Over Correlated Fading Channels , 2012, IEEE Signal Processing Letters.
[32] M. Lavanya,et al. Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI , 2017 .
[33] Jing Huang,et al. Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.
[34] Satyanarayana Vuppala,et al. Secrecy-Rate Analysis in Multitier Heterogeneous Networks Under Generalized Fading Model , 2017, IEEE Internet of Things Journal.
[35] C. Tellambura,et al. Linear estimation of correlated data in wireless sensor networks with optimum power allocation and analog modulation , 2008 .
[36] Huan Zhang,et al. Security Performance Analysis of DF Cooperative Relay Networks over Nakagami-m Fading Channels , 2017, KSII Trans. Internet Inf. Syst..
[37] Khoa N. Le. Selection Combiner Output Distributions of Multivariate Equally-Correlated Generalized-Rician Fading for Any Degrees of Freedom , 2018, IEEE Transactions on Vehicular Technology.
[38] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[39] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying Over Correlated Fading Channels , 2017, IEEE Transactions on Communications.
[40] Kaizhi Huang,et al. Security-oriented distributed access selection for D2D underlaying cellular networks , 2017 .
[41] Navrati Saxena,et al. Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.
[42] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[43] Yunfei Chen,et al. On Secrecy Performance of MISO SWIPT Systems With TAS and Imperfect CSI , 2016, IEEE Transactions on Communications.
[44] R. M. A. P. Rajatheva,et al. On the trivariate rician distribution , 2008, IEEE Transactions on Communications.
[45] Norman C. Beaulieu,et al. Infinite series representations of the bivariate Rayleigh and Nakagami-m distributions , 1997, IEEE Trans. Commun..
[46] Zhiguo Ding,et al. Achieving Optimal Diversity Gain in Buffer-Aided Relay Networks With Small Buffer Size , 2016, IEEE Transactions on Vehicular Technology.
[47] Xinbing Wang,et al. Secrecy Capacity Scaling of Large-Scale Networks With Social Relationships , 2017, IEEE Transactions on Vehicular Technology.