Security Analysis of Overlay Cognitive Wireless Networks with an Untrusted Secondary User
暂无分享,去创建一个
Wang Yan | Qu Xiaofei | Yin Hao | Li Mu | Huang Yuzhen | Yu Rui | Li Mianquan | Ren Baoquan
[1] Gaofeng Pan,et al. Secrecy Outage Analysis of Underlay Cognitive Radio Unit Over Nakagami- $m$ Fading Channels , 2014, IEEE Wireless Communications Letters.
[2] Mu Li,et al. Impact of Correlated Fading Channels on Cognitive Relay Networks With Generalized Relay Selection , 2018, IEEE Access.
[3] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[4] Hai Jiang,et al. Secure Communications in Underlay Cognitive Radio Networks: User Scheduling and Performance Analysis , 2016, IEEE Communications Letters.
[5] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[6] Mazen O. Hasna,et al. A performance study of dual-hop transmissions with fixed gain relays , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[7] Xuewen Liao,et al. Secure Transmission via a Wireless-Powered Untrusted Relay in Underlay CRNs , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).
[8] George K. Karagiannidis,et al. Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.
[9] Khaled M. Rabie,et al. Physical Layer Security With RF Energy Harvesting in AF Multi-Antenna Relaying Networks , 2016, IEEE Transactions on Communications.