Exploiting Opportunistic Scheduling Schemes to Improve Physical-Layer Security in MU-MISO NOMA Systems
暂无分享,去创建一个
[1] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[2] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[3] Thomas M. Cover,et al. Broadcast channels , 1972, IEEE Trans. Inf. Theory.
[4] Yueming Cai,et al. Physical layer security of non-orthogonal multiple access in cognitive radio networks , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).
[5] W. Marsden. I and J , 2012 .
[6] Dongwoo Kim,et al. Performance analysis with and without torch node in secure communications , 2015, 2015 International Conference on Advanced Technologies for Communications (ATC).
[7] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[8] Xiaofan Li,et al. Theoretical Analysis of the Dynamic Decode Ordering SIC Receiver for Uplink NOMA Systems , 2017, IEEE Communications Letters.
[9] Daniel Benevides da Costa,et al. An Efficient Relay–Destination Selection Scheme for Multiuser Multirelay Downlink Cooperative Networks , 2012, IEEE Transactions on Vehicular Technology.
[10] Yen-Ching Chang,et al. N-Dimension Golden Section Search: Its Variants and Limitations , 2009, 2009 2nd International Conference on Biomedical Engineering and Informatics.
[11] Mohamed-Slim Alouini,et al. Secrecy Outage of Max–Min TAS Scheme in MIMO-NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.
[12] Zhi Chen,et al. Joint Channel Estimation and Multiuser Detection for Uplink Grant-Free NOMA , 2018, IEEE Wireless Communications Letters.
[13] Yunfei Chen,et al. Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks , 2015, IEEE Transactions on Vehicular Technology.
[14] Honglin Zhao,et al. Relay Selection for Improved Security in Cognitive Relay Networks With Jamming , 2017, IEEE Wireless Communications Letters.
[15] Ali A. Nasir,et al. Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.
[16] D. Owen. Handbook of Mathematical Functions with Formulas , 1965 .
[17] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[18] Mohamed-Slim Alouini,et al. Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.
[19] Joseph Lipka,et al. A Table of Integrals , 2010 .
[20] George K. Karagiannidis,et al. Exploiting Direct Links for Physical Layer Security in Multiuser Multirelay Networks , 2016, IEEE Transactions on Wireless Communications.
[21] Shuangfeng Han,et al. Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.
[22] Beongku An,et al. Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks , 2018, Wirel. Commun. Mob. Comput..
[23] Daniel Benevides da Costa,et al. A New Efficient Low-Complexity Scheme for Multi-Source Multi-Relay Cooperative Networks , 2011, IEEE Transactions on Vehicular Technology.
[24] Aarnout Brombacher,et al. Probability... , 2009, Qual. Reliab. Eng. Int..
[25] Beongku An,et al. Performance Analysis of Wireless Energy Harvesting Multihop Cluster-Based Networks Over Nakagami- ${m}$ Fading Channels , 2018, IEEE Access.
[26] Yue Gao,et al. Physical layer security for 5G non-orthogonal multiple access in large-scale networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[27] Beongku An,et al. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks , 2017, Sensors.
[28] Nguyen Van Toan,et al. An energy efficient protocol based on fuzzy logic to extend network lifetime and increase transmission efficiency in wireless sensor networks , 2018, J. Intell. Fuzzy Syst..
[29] Vincenzo Mancuso,et al. A Survey on Opportunistic Scheduling in Wireless Communications , 2013, IEEE Communications Surveys & Tutorials.
[30] Nhu Tri Do,et al. A BNBF User Selection Scheme for NOMA-Based Cooperative Relaying Systems With SWIPT , 2017, IEEE Communications Letters.
[31] Xin Liu,et al. Efficient Antenna Selection and User Scheduling in 5G Massive MIMO-NOMA System , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).
[32] H. Vincent Poor,et al. Cooperative Non-orthogonal Multiple Access With Simultaneous Wireless Information and Power Transfer , 2015, IEEE Journal on Selected Areas in Communications.
[33] Daniel Benevides da Costa,et al. Improving the Performance of Cell-Edge Users in MISO-NOMA Systems Using TAS and SWIPT-Based Cooperative Transmissions , 2018, IEEE Transactions on Green Communications and Networking.
[34] Theodoros A. Tsiftsis,et al. Secure Users Oriented Downlink MISO NOMA , 2019, IEEE Journal of Selected Topics in Signal Processing.
[35] Nguyen Van Toan,et al. Incremental relaying networks with energy harvesting relay selection: Performance analysis , 2018, Trans. Emerg. Telecommun. Technol..
[36] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[37] David Tse,et al. Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.
[38] Gennaro Fedele. N-branch diversity reception of mary DPSK signals in slow and nonselective nakagami fading , 1996, Eur. Trans. Telecommun..
[39] Sarah J. Johnson,et al. Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations , 2016, IEEE Communications Magazine.
[40] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[41] Xiaohong Jiang,et al. On Secure Wireless Communications for IoT Under Eavesdropper Collusion , 2016, IEEE Transactions on Automation Science and Engineering.
[42] Halim Yanikomeroglu,et al. Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.
[43] Georges Kaddoum,et al. Secure Transmit Antenna Selection Protocol for MIMO NOMA Networks Over Nakagami-m Channels , 2018, IEEE Systems Journal.
[44] H. Vincent Poor,et al. Power Splitting-Based SWIPT With Decode-and-Forward Full-Duplex Relaying , 2016, IEEE Transactions on Wireless Communications.
[45] George K. Karagiannidis,et al. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.
[46] Derrick Wing Kwan Ng,et al. NOMA in Downlink SDMA With Limited Feedback: Performance Analysis and Optimization , 2017, IEEE Journal on Selected Areas in Communications.
[47] S. Leigh,et al. Probability and Random Processes for Electrical Engineering , 1989 .
[48] Nuwan S. Ferdinand,et al. Secrecy Outage Performance of MIMO Wiretap Channels with Multiple Jamming Signals , 2016 .