Physical Layer Secrecy and Transmission Resiliency of Device-to-Device Communications
暂无分享,去创建一个
[1] Derrick Wing Kwan Ng,et al. A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay , 2020, 2020 IEEE International Conference on Communications Workshops (ICC Workshops).
[2] Abbas Mohammadi,et al. Characterization of untrusted relaying networks in the presence of an adversary jammer , 2019, Wireless Networks.
[3] Tongtong Li,et al. Wireless Communications under Hostile Jamming: Security and Efficiency , 2018, Springer Singapore.
[4] Pedro Figueiredo Silva,et al. Wireless Positioning in IoT: A Look at Current and Future Trends , 2018, Sensors.
[5] Jeffrey A. Neasham,et al. Spread-Spectrum Techniques for Bio-Friendly Underwater Acoustic Communications , 2018, IEEE Access.
[6] Hien Quoc Ngo,et al. Full-Duplex Cyber-Weapon With Massive Arrays , 2017, IEEE Transactions on Communications.
[7] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[8] Matthew C. Valenti,et al. Analysis of a Frequency-Hopping Millimeter-Wave Cellular Uplink , 2016, IEEE Transactions on Wireless Communications.
[9] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[10] Derrick Wing Kwan Ng,et al. Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.
[11] Hamid Behroozi,et al. Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things , 2020, IEEE Transactions on Information Forensics and Security.
[12] Tongtong Li,et al. Physical layer security of multiband communications under hostile jamming , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[13] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .