Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA
暂无分享,去创建一个
Hui Zhao | Hsiao-Hwa Chen | Liangmin Wang | Yu'e Jiang | Hsiao-Hwa Chen | Liangmin Wang | Hui Zhao | Y. Jiang
[1] Chenchen Liu. Enhanced Physical Layer Security for Ultra-Dense D2D Communications Underlaying Cellular Networks with Full-Duplex Users , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).
[2] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[3] Hsiao-Hwa Chen,et al. Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach Based on Ordered Eigenvalues of Wishart Matrices , 2017, IEEE Transactions on Information Forensics and Security.
[4] Jintao Wang,et al. Covert communications with extremely low power under finite block length over slow fading , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[5] Shaoqian Li,et al. Covert Communication With the Help of Relay and Channel Uncertainty , 2019, IEEE Wireless Communications Letters.
[6] Mahmoud M. Elmesalawy,et al. Adaptive Resource Sharing Algorithm for Device-to-Device Communications Underlaying Cellular Networks , 2016, IEEE Communications Letters.
[7] Sherali Zeadally,et al. Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.
[8] Shu Fang,et al. Robust artificial noise-aided transmit optimisation for MISO wiretap channel with device-to-device underlay communication , 2018, IET Commun..
[9] Min Dong,et al. Joint Power Optimization for Device-to-Device Communication in Cellular Networks With Interference Control , 2017, IEEE Transactions on Wireless Communications.
[10] Song Guo,et al. Achieve Sustainable Ultra-Dense Heterogeneous Networks for 5G , 2017, ArXiv.
[11] Huiming Wang,et al. Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.
[12] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[13] Zhu Han,et al. A Survey on Socially Aware Device-to-Device Communications , 2018, IEEE Communications Surveys & Tutorials.
[14] Xiaohong Jiang,et al. Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective , 2018, IEEE Transactions on Communications.
[15] H. Vincent Poor,et al. Cooperative Non-Orthogonal Multiple Access in 5G Systems , 2015, IEEE Communications Letters.
[16] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[17] Jianfeng Ma,et al. Covert Wireless Communications in IoT Systems: Hiding Information in Interference , 2018, IEEE Wireless Communications.
[18] Matthieu R. Bloch,et al. Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.
[19] Kemal Davaslioglu,et al. The optimum received power levels of uplink non-orthogonal multiple access (NOMA) signals , 2017, 2017 IEEE 18th Wireless and Microwave Technology Conference (WAMICON).
[20] Xiang Cheng,et al. Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.
[21] Sherali Zeadally,et al. A Survey of Device-to-Device Communications: Research Issues and Challenges , 2018, IEEE Communications Surveys & Tutorials.
[22] Majid Ghaderi,et al. Uplink Scheduling in Wireless Networks with Successive Interference Cancellation , 2014, IEEE Transactions on Mobile Computing.
[23] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[24] Nan Yang,et al. Non-Orthogonal Multiple Access: Achieving Sustainable Future Radio Access , 2019, IEEE Communications Magazine.
[25] Dusit Niyato,et al. Auction-Based Time Scheduling for Backscatter-Aided RF-Powered Cognitive Radio Networks , 2019, IEEE Transactions on Wireless Communications.
[26] Martin Haenggi,et al. Superposition Coding Strategies: Design and Experimental Evaluation , 2012, IEEE Transactions on Wireless Communications.
[27] Leo Liberti,et al. Introduction to Global Optimization , 2006 .
[28] Cong Ling,et al. Design and Optimization of Scheduling and Non-Orthogonal Multiple Access Algorithms With Imperfect Channel State Information , 2018, IEEE Transactions on Vehicular Technology.
[29] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[30] Mohsen Guizani,et al. 5G D2D Networks: Techniques, Challenges, and Future Prospects , 2018, IEEE Systems Journal.
[31] Rui Zhang,et al. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications , 2016, IEEE Internet of Things Journal.
[32] Jiaheng Wang,et al. Resource Sharing of Underlaying Device-to-Device and Uplink Cellular Communications , 2013, IEEE Communications Letters.
[33] Caijun Zhong,et al. Joint Spectrum and Power Allocation for D2D Communications Underlaying Cellular Networks , 2016, IEEE Transactions on Vehicular Technology.
[34] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[35] Nei Kato,et al. Device-to-Device Communication in LTE-Advanced Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.