Secrecy Capacity Scaling of Large-Scale Networks With Social Relationships
暂无分享,去创建一个
Xinbing Wang | Xiaohong Jiang | Wenjun Zhang | Luoyi Fu | Xiaoying Liu | Kechen Zheng | Jinbei Zhang
[1] Donald F. Towsley,et al. Security-capacity trade-off in large wireless networks using keyless secrecy , 2010, MobiHoc '10.
[2] Zhu Han,et al. Secure wireless communications via cooperation , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[3] Massimo Franceschetti,et al. Closing the Gap in the Capacity of Wireless Networks Via Percolation Theory , 2007, IEEE Transactions on Information Theory.
[4] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[5] Lifeng Wang,et al. Artificial-Noise Aided Secure Transmission in Large Scale Spectrum Sharing Networks , 2016, IEEE Transactions on Communications.
[6] Xiaoying Gan,et al. Capacity of Wireless Networks With Social Characteristics , 2016, IEEE Transactions on Wireless Communications.
[7] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.
[8] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[9] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[10] Ayfer Özgür,et al. Hierarchical Cooperation Achieves Linear Capacity Scaling in Ad Hoc Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[11] Xinbing Wang,et al. Secrecy capacity scaling of large-scale cognitive networks , 2014, MobiHoc '14.
[12] Ayfer Özgür,et al. Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks , 2006, IEEE Transactions on Information Theory.
[13] Moe Z. Win,et al. Wireless secrecy in large-scale networks , 2011, 2011 Information Theory and Applications Workshop.
[14] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[15] Hamid R. Sadjadpour,et al. Capacity of Wireless Networks with Social Behavior , 2013, IEEE Transactions on Wireless Communications.
[16] Thomas H. Cormen,et al. Introduction to algorithms [2nd ed.] , 2001 .
[17] Jie Li,et al. Secrecy capacity maximization for secure cooperative ad-hoc networks , 2013, 2013 Proceedings IEEE INFOCOM.
[18] Xinbing Wang,et al. Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks , 2014, IEEE/ACM Transactions on Networking.
[19] Donald F. Towsley,et al. Secret communication in large wireless networks without eavesdropper location information , 2012, 2012 Proceedings IEEE INFOCOM.
[20] Shuguang Cui,et al. Throughput and Delay Scaling in Supportive Two-Tier Networks , 2012, IEEE Journal on Selected Areas in Communications.
[21] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[22] Shuguang Cui,et al. Scaling Laws for Overlaid Wireless Networks: A Cognitive Radio Network vs. a Primary Network , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[23] David Tse,et al. Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.
[24] Xiaohong Jiang,et al. Delay and Capacity in Ad Hoc Mobile Networks with f-cast Relay Algorithms , 2011, IEEE Transactions on Wireless Communications.
[25] Wei Zhang,et al. Connectivity of wireless information-theoretic secure networks , 2014, 2014 IEEE Global Communications Conference.
[26] Ranjan K. Mallik,et al. Physical Layer Security in Three-Tier Wireless Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Information Forensics and Security.
[27] Michele Garetto,et al. Capacity scaling of wireless networks with inhomogeneous node density: upper bounds , 2009, IEEE Journal on Selected Areas in Communications.
[28] H. Vincent Poor,et al. Secrecy throughput of MANETs with malicious nodes , 2009, 2009 IEEE International Symposium on Information Theory.
[29] Kin K. Leung,et al. Multi-user diversity for secrecy in wireless networks , 2010, 2010 Information Theory and Applications Workshop (ITA).
[30] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[31] Donald F. Towsley,et al. Physical layer security from inter-session interference in large wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[32] Jasmine Novak,et al. Geographic routing in social networks , 2005, Proc. Natl. Acad. Sci. USA.
[33] Xinbing Wang,et al. Impacts of Social Relationships and Inhomogeneous Node Distribution on the Network Performance , 2016, IEEE Transactions on Wireless Communications.
[34] Yuguang Fang,et al. The Capacity of Heterogeneous Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.