Secure Full-Duplex Device-to-Device Communication
暂无分享,去创建一个
[1] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[2] Xiang Cheng,et al. Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).
[3] Carl Wijting,et al. Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.
[4] R. M. A. P. Rajatheva,et al. Full duplex device-to-device communication in cellular networks , 2014, 2014 European Conference on Networks and Communications (EuCNC).
[5] Philip Levis,et al. Practical, real-time, full duplex wireless , 2011, MobiCom.
[6] Yangyang Zhang,et al. SWIPT in MISO full-duplex systems , 2017, Journal of Communications and Networks.
[7] Ashutosh Sabharwal,et al. Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.
[8] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[9] Philip Levis,et al. Achieving single channel, full duplex wireless communication , 2010, MobiCom.
[11] Jiaheng Wang,et al. Security Enhancement via Device-to-Device Communication in Cellular Networks , 2016, IEEE Signal Processing Letters.
[12] Muhammad R. A. Khandaker,et al. Wireless information and power transfer in full-duplex communication systems , 2016, 2016 IEEE International Conference on Communications (ICC).
[13] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[14] Sachin Katti,et al. Full duplex radios , 2013, SIGCOMM.
[15] Sungsoo Park,et al. Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.
[16] Muhammad R. A. Khandaker,et al. Truth-Telling Mechanism for Two-Way Relay Selection for Secrecy Communications With Energy-Harvesting Revenue , 2017, IEEE Transactions on Wireless Communications.
[17] Nei Kato,et al. Device-to-Device Communication in LTE-Advanced Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[18] Muhammad R. A. Khandaker,et al. Robust Secrecy Beamforming With Energy-Harvesting Eavesdroppers , 2015, IEEE Wireless Communications Letters.
[19] Christos Masouros,et al. Constructive interference based secure precoding , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[20] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[21] Muhammad R. A. Khandaker,et al. Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.
[22] Muhammad R. A. Khandaker,et al. Joint Transmit Power and Relay Two-Way Beamforming Optimization for Energy-Harvesting Full-Duplex Communications , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[23] Muhammad R. A. Khandaker,et al. SWIPT in MISO Multicasting Systems , 2014, IEEE Wireless Communications Letters.