Unequal Secrecy Protection for Untrusted Two-Way Relaying Systems: Constellation Overlapping and Noise Aggregation
暂无分享,去创建一个
[1] Daniel Benevides da Costa,et al. Distributed Role Selection With ANC and TDBC Protocols in Two-Way Relaying Systems , 2015, IEEE Transactions on Communications.
[2] Marco Chiani,et al. New exponential bounds and approximations for the computation of error probability in fading channels , 2003, IEEE Trans. Wirel. Commun..
[3] George K. Karagiannidis,et al. Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[4] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[5] Ming Xiao,et al. Full-Duplex Two-Way and One-Way Relaying: Average Rate, Outage Probability, and Tradeoffs , 2016, IEEE Transactions on Wireless Communications.
[6] Kai-Kit Wong,et al. Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer , 2017, IEEE Transactions on Vehicular Technology.
[7] George K. Karagiannidis,et al. Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels , 2017, IEEE Transactions on Vehicular Technology.
[8] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[9] Walid Saad,et al. On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.
[10] Li Sun,et al. Securing Two-Way Cooperative Systems With an Untrusted Relay: A Constellation-Rotation Aided Approach , 2015, IEEE Communications Letters.
[11] Theodoros A. Tsiftsis,et al. Joint Beamforming Alignment With Suboptimal Power Allocation for a Two-Way Untrusted Relay Network , 2018, IEEE Transactions on Information Forensics and Security.
[12] Yichen Wang,et al. Cooperative Privacy Preserving Scheme for Downlink Transmission in Multiuser Relay Networks , 2017, IEEE Transactions on Information Forensics and Security.
[13] Kamel Tourki,et al. Adaptive Secure Transmission for RF-EH Untrusted Relaying with Alien Eavesdropping , 2017, IEEE Communications Letters.
[14] Chengwen Xing,et al. Millimeter-Wave Secrecy Beamforming Designs for Two-Way Amplify-and-Forward MIMO Relaying Networks , 2017, IEEE Transactions on Vehicular Technology.
[15] Zesong Fei,et al. Optimal Transmit Beamforming for Secure SWIPT in a Two-Tier HetNet , 2017, IEEE Communications Letters.
[16] Yun Hee Kim,et al. Outage-Optimal Power and Time Allocation for Rate-Aware Two-Way Relaying With a Decode-and-Forward Protocol , 2016, IEEE Transactions on Vehicular Technology.
[17] Wei Xiang,et al. Precoding and Cooperative Jamming in Multi- Antenna Two-Way Relaying Wiretap Systems Without Eavesdropper’s Channel State Information , 2017, IEEE Transactions on Information Forensics and Security.
[18] K. J. Ray Liu,et al. Two-Way Network-Coded Relaying With Delay Constraint , 2015, IEEE Transactions on Wireless Communications.
[19] Quanzhong Li,et al. Artificial Noise Aided Secure Precoding for MIMO Untrusted Two-Way Relay Systems With Perfect and Imperfect Channel State Information , 2018, IEEE Transactions on Information Forensics and Security.
[20] Zhiguo Ding,et al. Hybrid Spatio-Temporal Artificial Noise Design for Secure MIMOME-OFDM Systems , 2017, IEEE Transactions on Vehicular Technology.
[21] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[22] Li Sun,et al. Security enhancement for video transmission via noise aggregation in immersive systems , 2015, Multimedia Tools and Applications.
[23] H. Vincent Poor,et al. Near-Optimal Modulo-and-Forward Scheme for the Untrusted Relay Channel , 2016, IEEE Transactions on Information Theory.
[24] Li Sun,et al. Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation , 2016, IEEE Transactions on Vehicular Technology.
[25] Ahmad Abu Al Haija,et al. Message Priority in Two-Way Decode-Forward Relaying , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[26] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[27] A. Lee Swindlehurst,et al. Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[28] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[29] Tobias J. Oechtering,et al. Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.
[30] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..
[31] Xiaofeng Tao,et al. Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks , 2018, IEEE Access.
[32] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[33] Fan Li,et al. Message-Prioritization Based Unequal Secrecy Protection for Untrusted Two-Way Relaying Networks , 2018, 2018 IEEE International Conference on Communications (ICC).
[34] Pramod K. Varshney,et al. Resource Allocation and Outage Analysis for an Adaptive Cognitive Two-Way Relay Network , 2015, IEEE Transactions on Wireless Communications.
[35] Ruonan Zhang,et al. Cross-Polarized Three-Dimensional Channel Measurement and Modeling for Small-Cell Street Canyon Scenario , 2018, IEEE Transactions on Vehicular Technology.
[36] Daniel Benevides da Costa,et al. Beamforming in Traffic-Aware Two-Way Relay Systems With Channel Estimation Error and Feedback Delay , 2017, IEEE Transactions on Vehicular Technology.
[37] Xiaomei Zhang,et al. Connecting a City by Wireless Backhaul: 3D Spatial Channel Characterization and Modeling Perspectives , 2017, IEEE Communications Magazine.
[38] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[39] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[40] Mustafa Cenk Gursoy. Secure Communication in the Low-SNR Regime , 2012, IEEE Transactions on Communications.
[41] Armin Wittneben,et al. Spectral efficient protocols for half-duplex fading relay channels , 2007, IEEE Journal on Selected Areas in Communications.
[42] Yan Zhang,et al. Secure Transmission for Heterogeneous Cellular Networks With Wireless Information and Power Transfer , 2018, IEEE Systems Journal.