Secure Transmission in HARQ-Assisted Non-Orthogonal Multiple Access Networks
暂无分享,去创建一个
[1] Yueming Cai,et al. Secure Transmission in Non-Orthogonal Multiple Access Networks With an Untrusted Relay , 2019, IEEE Wireless Communications Letters.
[2] Zhiguo Ding,et al. On the Performance of NOMA With Hybrid ARQ , 2018, IEEE Transactions on Vehicular Technology.
[3] George K. Karagiannidis,et al. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.
[4] Qi Zhang,et al. Simple Hybrid ARQ Schemes Based on Systematic Polar Codes for IoT Applications , 2017, IEEE Communications Letters.
[5] H. Vincent Poor,et al. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.
[6] Tao Zhang,et al. Secure On-Off Transmission in mmWave Systems With Randomly Distributed Eavesdroppers , 2019, IEEE Access.
[7] Jinho Choi,et al. On HARQ-IR for Downlink NOMA Systems , 2016, IEEE Transactions on Communications.
[8] Sarah J. Johnson,et al. Massive Non-Orthogonal Multiple Access for Cellular IoT: Potentials and Limitations , 2016, IEEE Communications Magazine.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Yueming Cai,et al. Physical Layer Security in HARQ-Assisted Non-Orthogonal Multiple Access Networks , 2019, 2019 IEEE 2nd International Conference on Electronic Information and Communication Technology (ICEICT).
[11] H. Vincent Poor,et al. On the Spectral Efficiency and Security Enhancements of NOMA Assisted Multicast-Unicast Streaming , 2016, IEEE Transactions on Communications.
[12] Xiangyun Zhou,et al. Secure Transmission in Linear Multihop Relaying Networks , 2017, IEEE Transactions on Wireless Communications.
[13] Kwok-Yan Lam,et al. Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.
[14] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[15] Ke Xiao,et al. Opportunistic Multicast NOMA with Security Concerns in a 5G Massive MIMO System , 2018, IEEE Communications Magazine.
[16] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[17] Pinyi Ren,et al. Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis , 2019, IEEE Transactions on Information Forensics and Security.
[18] Vincent K. N. Lau,et al. On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.
[19] Cheng-Xiang Wang,et al. Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full Duplex , 2018, IEEE Journal on Selected Areas in Communications.
[20] Shihao Yan,et al. Secure Transmission to the Strong User in Non-Orthogonal Multiple Access , 2018, IEEE Communications Letters.
[21] Jinho Choi. On Multiple Access Using H-ARQ with SIC Techniques for Wireless Ad Hoc Networks , 2013, Wirel. Pers. Commun..
[22] Yichen Wang,et al. Secure Cooperative Transmission Against Jamming-Aided Eavesdropper for ARQ Based Wireless Networks , 2017, IEEE Access.
[23] Zhiguo Ding,et al. Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.
[24] Yangyang Zhang,et al. NOMA-based multiple-antenna and multiple-relay networks over Nakagami-m fading channels with imperfect CSI and SIC error , 2018, IET Commun..
[25] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[26] Yueming Cai,et al. On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ , 2014, IEEE Communications Letters.
[27] Shi Jin,et al. On the Secure Spectral-Energy Efficiency Tradeoff in Random Cognitive Radio Networks , 2016, IEEE Journal on Selected Areas in Communications.
[28] Yueming Cai,et al. Physical Layer Security in Cognitive Radio Inspired NOMA Network , 2019, IEEE Journal of Selected Topics in Signal Processing.
[29] Sarah J. Johnson,et al. On the Fundamental Limits of Random Non-Orthogonal Multiple Access in Cellular Massive IoT , 2017, IEEE Journal on Selected Areas in Communications.
[30] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[31] Yongming Huang,et al. Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks , 2019, IEEE Transactions on Information Forensics and Security.
[32] Mohamed-Slim Alouini,et al. Cooperative HARQ-Assisted NOMA Scheme in Large-Scale D2D Networks , 2017, IEEE Transactions on Communications.
[33] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[34] Pierre Duhamel,et al. Rate Adaptation for Incremental Redundancy Secure HARQ , 2016, IEEE Transactions on Communications.
[35] Mohamed-Slim Alouini,et al. Ergodic Secret Message Capacity of the Wiretap Channel with Finite-Rate Feedback , 2012, IEEE Transactions on Wireless Communications.
[36] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[37] Mohamed-Slim Alouini,et al. Physical Layer Security for Cooperative NOMA Systems , 2018, IEEE Transactions on Vehicular Technology.
[38] Pinyi Ren,et al. Secure ARQ Protocol for Wireless Communications: Performance Analysis and Packet Coding Design , 2018, IEEE Transactions on Vehicular Technology.
[39] Branka Vucetic,et al. Timely Status Update in Internet of Things Monitoring Systems: An Age-Energy Tradeoff , 2019, IEEE Internet of Things Journal.
[40] Leszek Szczecinski,et al. Rate Adaptation for Secure HARQ Protocols , 2018, IEEE Transactions on Information Forensics and Security.
[41] Chao Zhai,et al. Non-orthogonal multiple access relaying with truncated ARQ , 2017, IET Commun..
[42] Wei-Ping Zhu,et al. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.
[43] Lajos Hanzo,et al. Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.