QoS-Aware EnhancedSecurity EnhancedSecurity EnhancedSecurity for TDMA Transmissions from Buffered Source Nodes
暂无分享,去创建一个
[1] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[2] Trung Quang Duong,et al. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[3] Umberto Spagnolini,et al. Stable Throughput of Cognitive Radios With and Without Relaying Capability , 2007, IEEE Transactions on Communications.
[4] Xiangyun Zhou,et al. Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.
[5] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[6] John S. Thompson,et al. Amplify-and-forward with partial relay selection , 2008, IEEE Communications Letters.
[7] Yueming Cai,et al. A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.
[8] Trung Quang Duong,et al. QoS-Based Design for Security Enhancement in TDMA-Based Wireless Networks , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[9] K. J. Ray Liu,et al. Opportunistic Multiple Access for Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.
[10] Naofal Al-Dhahir,et al. Security of Rechargeable Energy-Harvesting Transmitters in Wireless Networks , 2016, IEEE Wireless Communications Letters.
[11] Carl D. Meyer,et al. Matrix Analysis and Applied Linear Algebra , 2000 .
[12] Matthew R. McKay,et al. Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.
[13] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[14] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[15] Jinhong Yuan,et al. Artificial Noise: Transmission Optimization in , 2015 .
[16] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[17] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[18] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[19] Huiming Wang,et al. Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.
[20] Xiangyun Zhou,et al. Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.
[21] Xiangyun Zhou,et al. On–Off-Based Secure Transmission Design With Outdated Channel State Information , 2016, IEEE Transactions on Vehicular Technology.
[22] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[23] K. J. Ray Liu,et al. Cognitive multiple access via cooperation: Protocol design and performance analysis , 2007, IEEE Transactions on Information Theory.
[24] Daniel Benevides da Costa,et al. Performance Analysis of Relay Selection Techniques With Clustered Fixed-Gain Relays , 2010, IEEE Signal Processing Letters.
[25] Zhigang Cao,et al. Cooperative Beamforming for Cognitive Radio Networks: A Cross-Layer Design , 2012, IEEE Transactions on Communications.
[26] Zhu Han,et al. Cooperative jamming for wireless physical layer security , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.
[27] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[28] Jinhong Yuan,et al. Optimization of Code Rates in SISOME Wiretap Channels , 2015, IEEE Transactions on Wireless Communications.
[29] Rodney A. Kennedy,et al. Cooperative jamming for secrecy in decentralized wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[30] Hui-Ming Wang,et al. Secrecy-throughput-optimal artificial noise design against randomly located eavesdroppers , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).
[31] R. M. Loynes,et al. The stability of a queue with non-independent inter-arrival and service times , 1962, Mathematical Proceedings of the Cambridge Philosophical Society.
[32] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[33] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.