暂无分享,去创建一个
[1] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[2] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[3] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.
[4] Rui Zhang,et al. On peak versus average interference power constraints for protecting primary users in cognitive radio networks , 2008, IEEE Transactions on Wireless Communications.
[5] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[6] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[7] Geoffrey Ye Li,et al. Cognitive radio networking and communications: an overview , 2011, IEEE Transactions on Vehicular Technology.
[8] Yan Chen,et al. Cooperative Spectrum Access for Cognitive Radio Network Employing Rateless Code , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.
[9] Halim Yanikomeroglu,et al. Access Strategies for Spectrum Sharing in Fading Environment: Overlay, Underlay, and Mixed , 2010, IEEE Transactions on Mobile Computing.
[10] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[11] Andrea J. Goldsmith,et al. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.
[12] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[13] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[14] Matthew R. McKay,et al. Performance Analysis of MIMO-MRC in Double-Correlated Rayleigh Environments , 2005, IEEE Transactions on Communications.
[15] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[16] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[17] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[18] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[19] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[20] Hans-Jürgen Zepernick,et al. On non-zero secrecy capacity and outage probability of cognitive radio networks , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[21] Hyokang Chang,et al. Line, Trunk, and Service Circuit Test System of ITT System 1240 , 1984, IEEE J. Sel. Areas Commun..
[22] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[23] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[24] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[25] D. Tolmie,et al. HIPPI: simplicity yields success , 1993, IEEE Network.
[26] Mansoor Shafi,et al. The Effects of Limited Channel Knowledge on Cognitive Radio System Capacity , 2013, IEEE Transactions on Vehicular Technology.
[27] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[28] Holger Boche,et al. Physical Layer Service Integration in Wireless Networks : Signal processing challenges , 2014, IEEE Signal Processing Magazine.
[29] Ying-Chang Liang,et al. Optimal Power Allocation Strategies for Fading Cognitive Radio Channels with Primary User Outage Constraint , 2011, IEEE Journal on Selected Areas in Communications.
[30] Song Ci,et al. On physical layer security for cognitive radio networks , 2013, IEEE Network.
[31] Yu-Dong Yao,et al. An Adaptive Cooperation Diversity Scheme With Best-Relay Selection in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.