Power control and channel access for physical-layer security of D2D underlay communication
暂无分享,去创建一个
[1] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[2] Vincent K. N. Lau,et al. Delay-aware cross-layer design for device-to-device communications in future cellular systems , 2014, IEEE Communications Magazine.
[3] Jiaheng Wang,et al. Resource Sharing of Underlaying Device-to-Device and Uplink Cellular Communications , 2013, IEEE Communications Letters.
[4] Olga Galinina,et al. Cellular traffic offloading onto network-assisted device-to-device connections , 2014, IEEE Communications Magazine.
[5] Zhu Han,et al. Radio resource allocation for physical-layer security in D2D underlay communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[6] Xiaoying Gan,et al. Secrecy-based channel assignment for device-to-device communication: An auction approach , 2013, 2013 International Conference on Wireless Communications and Signal Processing.
[7] Rose Qingyang Hu,et al. Enable device-to-device communications underlaying cellular networks: challenges and research aspects , 2014, IEEE Communications Magazine.
[8] Wenbo Wang,et al. Transmission Capacity of D2D Communication under Heterogeneous Networks with Multi-Bands , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).
[9] Raed A. Abd-Alhameed,et al. Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.
[10] Xinbing Wang,et al. Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.
[11] Bin Xia,et al. Secure communications of cellular users in device-to-device communication underlaying cellular networks , 2014, 2014 Sixth International Conference on Wireless Communications and Signal Processing (WCSP).
[12] Zhu Han,et al. Game-theoretic resource allocation methods for device-to-device communication , 2014, IEEE Wireless Communications.
[13] Munnujahan Ara,et al. Secure communications with D2D cooperation , 2015, 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA'15).
[14] Zhu Han,et al. Joint scheduling and resource allocation for device-to-device underlay communication , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).