Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks
暂无分享,去创建一个
[1] Ronald F. Boisvert,et al. NIST Handbook of Mathematical Functions , 2010 .
[2] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[3] Alireza Bayesteh,et al. Asymptotic Analysis of Amplify and Forward Relaying in a Parallel MIMO Relay Network , 2007, IEEE Transactions on Information Theory.
[4] Gonzalo Seco-Granados,et al. Opportunistic relay selection with outdated CSI: outage probability and diversity analysis , 2009, IEEE Transactions on Wireless Communications.
[5] Jianhua Lu,et al. Improving Wireless Security for Bidirectional Communication Scenarios , 2012, IEEE Transactions on Vehicular Technology.
[6] Ioannis Krikidis,et al. Opportunistic relay selection for cooperative networks with secrecy constraints , 2010, IET Commun..
[7] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[8] Joseph Lipka,et al. A Table of Integrals , 2010 .
[9] Ozgur Oyman. Opportunism in Multiuser Relay Channels: Scheduling, Routing and Spectrum Reuse , 2007, 2007 IEEE International Symposium on Information Theory.
[10] Wei Xu,et al. On the Design of Relay Selection Strategies in Regenerative Cooperative Networks with Outdated CSI , 2011, IEEE Transactions on Wireless Communications.
[11] Kai-Jie Yang,et al. On Power Allocation and Relay Selection for a Two-Way Amplify-and-Forward Relaying System , 2013, IEEE Transactions on Communications.
[12] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[13] Derrick Wing Kwan Ng,et al. Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.
[14] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[15] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[16] Amir Beck,et al. A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..
[17] Shahram Shahbazpanahi,et al. Achievable Rate Region under Joint Distributed Beamforming and Power Allocation for Two-Way Relay Networks , 2012, IEEE Transactions on Wireless Communications.
[18] H. Vincent Poor,et al. Collaborative beamforming for distributed wireless ad hoc sensor networks , 2005, IEEE Transactions on Signal Processing.
[19] George K. Karagiannidis,et al. Amplify-and-Forward Relay Selection with Outdated Channel Estimates , 2012, IEEE Transactions on Communications.
[20] Shahram Shahbazpanahi,et al. Optimal Distributed Beamforming for Two-Way Relay Networks , 2010, IEEE Transactions on Signal Processing.
[21] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[22] Hyundong Shin,et al. Cooperative Communications with Outage-Optimal Opportunistic Relaying , 2007, IEEE Transactions on Wireless Communications.
[23] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[24] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[25] M. V. Clark,et al. Theoretical reliability of MMSE linear diversity combining in Rayleigh-fading additive interference channels , 1998, IEEE Trans. Commun..
[26] Mérouane Debbah,et al. Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[27] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[28] George K. Karagiannidis,et al. The Diversity Potential of Relay Selection with Practical Channel Estimation , 2011, IEEE Transactions on Wireless Communications.
[29] A. Lee Swindlehurst,et al. Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming , 2014, IEEE Trans. Signal Process..
[30] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[31] Nuwan S. Ferdinand,et al. Effects of Outdated CSI on the Secrecy Performance of MISO Wiretap Channels with Transmit Antenna Selection , 2013, IEEE Communications Letters.
[32] Xiaojun Yuan,et al. Hermitian Precoding for Distributed MIMO Systems with Individual Channel State Information , 2013, IEEE Journal on Selected Areas in Communications.
[33] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[34] J. Galambos. Review: M. R. Leadbetter, Georg Lindgren and Holger Rootzen, Extremes and related properties of random sequences and processes , 1985 .
[35] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[36] Ozgur Oyman. Opportunistic scheduling and spectrum reuse in relay-based cellular networks , 2010, IEEE Transactions on Wireless Communications.
[37] Qiang Li,et al. Optimal joint cooperative beamforming and artificial noise design for secrecy rate maximization in AF relay networks , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[38] Mohamed-Slim Alouini,et al. Order Statistics in Wireless Communications: References , 2011 .
[39] Kin K. Leung,et al. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.
[40] Kin K. Leung,et al. Artificial Noise Generation from Cooperative Relays for Everlasting Secrecy in Two-Hop Wireless Networks , 2011, IEEE Journal on Selected Areas in Communications.
[41] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[42] Xuemin Shen,et al. Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.
[43] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[44] M. R. Leadbetter,et al. Extremes and Related Properties of Random Sequences and Processes: Springer Series in Statistics , 1983 .
[45] Mohamed-Slim Alouini,et al. On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.
[46] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..
[47] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[48] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[49] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.