Sum Rate Maximization of Secure NOMA Transmission with Imperfect CSI
暂无分享,去创建一个
Yik-Chung Wu | Shuai Wang | Pengcheng Mu | Zongze Li | Yik-Chung Wu | Zongze Li | Shuai Wang | Pengcheng Mu
[1] Feng Liu,et al. Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.
[2] Mandy Eberhart,et al. Digital Communication Over Fading Channels , 2016 .
[3] F. Richard Yu,et al. Secure Transmission via Beamforming Optimization for NOMA Networks , 2020, IEEE Wireless Communications.
[4] Mohamed-Slim Alouini,et al. Secure Broadcasting With Imperfect Channel State Information at the Transmitter , 2016, IEEE Transactions on Wireless Communications.
[5] Hui-Ming Wang,et al. An Adaptive Transmission Scheme for Slow Fading Wiretap Channel with Channel Estimation Errors , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[6] Derrick Wing Kwan Ng,et al. Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems , 2017, IEEE Transactions on Communications.
[7] G. Wachsmuth. Differentiability of implicit functions: Beyond the implicit function theorem , 2014 .
[8] Pingzhi Fan,et al. On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users , 2014, IEEE Signal Processing Letters.
[9] Vincent K. N. Lau,et al. On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.
[10] Prabhu Babu,et al. Majorization-Minimization Algorithms in Signal Processing, Communications, and Machine Learning , 2017, IEEE Transactions on Signal Processing.
[11] Zhu Han,et al. Secrecy sum rate maximization in NOMA systems with wireless information and power transfer , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).
[12] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[13] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[14] Shuai Wang,et al. Machine Intelligence at the Edge With Learning Centric Power Allocation , 2019, IEEE Transactions on Wireless Communications.
[15] Yik-Chung Wu,et al. Probabilistic Constrained Secure Transmissions: Variable-Rate Design and Performance Analysis , 2020, IEEE Transactions on Wireless Communications.
[16] Theodore S. Rappaport,et al. Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .
[17] Norman C. Beaulieu,et al. Joint Beamforming and Jamming Optimization for Secure Transmission in MISO-NOMA Networks , 2019, IEEE Transactions on Communications.
[18] D. Hunter,et al. A Tutorial on MM Algorithms , 2004 .
[19] H. Vincent Poor,et al. Multiple Access Techniques for 5G Wireless Networks and Beyond , 2018 .
[20] Dan Raphaeli,et al. Series expansions for the distribution of noncentral indefinite quadratic forms in complex normal variables , 1995 .
[21] Shidong Zhou,et al. On the Monotonicity, Log-Concavity, and Tight Bounds of the Generalized Marcum and Nuttall $Q$-Functions , 2010, IEEE Transactions on Information Theory.
[22] Xiangyun Zhou,et al. Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.
[23] Chenxi Liu,et al. Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access , 2019, IEEE Transactions on Information Forensics and Security.
[24] W. K. Pratt,et al. Partial differentials of Marcum's Q function , 1968 .