-
1
-
-
0033171330
-
Cognitive radio: Making software radios more personal
-
Aug.
-
J. Mitola and G. Q. Maguire, "Cognitive radio: Making software radios more personal," IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.
-
(1999)
IEEE Pers. Commun.
, vol.6
, Issue.4
, pp. 13-18
-
-
Mitola, J.1
Maguire, G.Q.2
-
3
-
-
84859806616
-
Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions
-
Apr.
-
Y. Zou, Y.-D. Yao, and B. Zheng, "Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions," IEEE Commun. Mag., vol. 50, no. 4, pp. 98-103. Apr. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.4
, pp. 98-103
-
-
Zou, Y.1
Yao, Y.-D.2
Zheng, B.3
-
4
-
-
46149091216
-
Sensing-throughput tradeoff for cognitive radio networks
-
Apr.
-
Y.-C. Liang, Y. Zeng, E. Peh, and A. T. Hoang, "Sensing-throughput tradeoff for cognitive radio networks," IEEE Trans. Wireless Commun., vol. 7, no. 4, pp. 1326-1337, Apr. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.4
, pp. 1326-1337
-
-
Liang, Y.-C.1
Zeng, Y.2
Peh, E.3
Hoang, A.T.4
-
5
-
-
79951677801
-
Cognitive transmissions with multiple relays in cognitive radio networks
-
Feb.
-
Y. Zou, Y.-D. Yao, and B. Zheng, "Cognitive transmissions with multiple relays in cognitive radio networks," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 648-659, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 648-659
-
-
Zou, Y.1
Yao, Y.-D.2
Zheng, B.3
-
6
-
-
84873711287
-
A survey on security threats and detection techniques in cognitive radio networks
-
Feb.
-
A. G. Fragkiadakis, E. Z. Tragos, and I. G. Askoxylakis, "A survey on security threats and detection techniques in cognitive radio networks," IEEE Commun. Surv. & Tut., vol. 15, no. 1 , pp. 428-445, Feb. 2013.
-
(2013)
IEEE Commun. Surv. & Tut.
, vol.15
, Issue.1
, pp. 428-445
-
-
Fragkiadakis, A.G.1
Tragos, E.Z.2
Askoxylakis, I.G.3
-
7
-
-
0016562514
-
The wire-tap channel
-
A. D.Wyner, "The wire-tap channel," Bell Syst. Tech. Journ., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. Journ.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
9
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. Rodrigues, and S. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.3
McLaughlin, S.4
-
10
-
-
68349116049
-
-
MA: Now Publishers
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security", MA: Now Publishers, vol. 5, no. 4-5, pp. 355-580, 2008.
-
(2008)
Information Theoretic Security
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
11
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
12
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Oct.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Oct. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
13
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
July
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, July 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
14
-
-
84855381750
-
Outage probability based power distribution between data and artificial noise for physical layer security
-
Feb.
-
N. Romero-Zurita, M. Ghogho, and D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.2
, pp. 71-74
-
-
Romero-Zurita, N.1
Ghogho, M.2
McLernon, D.3
-
15
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
-
Mar.
-
W. Liao, T. Chang, W. Ma, and C. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Veh. Tech., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Veh. Tech.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.1
Chang, T.2
Ma, W.3
Chi, C.4
-
16
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
17
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
18
-
-
84855381750
-
Outage probability based power distribution between data and artificial noise for physical layer security
-
Feb.
-
N. Romero-Zurita, M. Ghogho, and D. McLernon, "Outage probability based power distribution between data and artificial noise for physical layer security," IEEE Signal Process. Lett., vol. 19, no. 2, pp. 71-74, Feb. 2012.
-
(2012)
IEEE Signal Process. Lett.
, vol.19
, Issue.2
, pp. 71-74
-
-
Romero-Zurita, N.1
Ghogho, M.2
McLernon, D.3
-
19
-
-
79952680469
-
Secure communication in multiantenna cognitive radio networks with imperfect channel state information
-
Apr.
-
Y. Pei, Y.-C. Liang, K.C. Teh, and K. Li, "Secure communication in multiantenna cognitive radio networks with imperfect channel state information," IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1683-1693, Apr. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.4
, pp. 1683-1693
-
-
Pei, Y.1
Liang, Y.-C.2
Teh, K.C.3
Li, K.4
-
20
-
-
77953222550
-
On the relationship between the multi-antenna secrecy communications and cognitive radio communications
-
Jun.
-
L. Zhang, R. Zhang, Y.-C. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," IEEE Trans. Commun., vol. 58, no. 6, pp. 1877-1886, Jun. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.6
, pp. 1877-1886
-
-
Zhang, L.1
Zhang, R.2
Liang, Y.-C.3
Xin, Y.4
Cui, S.5
-
21
-
-
84891556599
-
Proposed relay selection scheme for physical layer security in cognitive radio networks
-
Nov.
-
H. Sakran, M. Shokair, O. Nasr, S. El-Rabaie, and A. A. El-Azm, "Proposed relay selection scheme for physical layer security in cognitive radio networks," IET Commun., vol. 6, no. 16, pp. 2676-2687, Nov. 2011.
-
(2011)
IET Commun.
, vol.6
, Issue.16
, pp. 2676-2687
-
-
Sakran, H.1
Shokair, M.2
Nasr, O.3
El-Rabaie, S.4
El-Azm, A.A.5
-
22
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec.
-
Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
23
-
-
79951683178
-
Outage probability of cognitive relay networks with interference constraints
-
Feb.
-
J. Lee, H. Wang, J. G. Andrews, and D. Hong, "Outage probability of cognitive relay networks with interference constraints," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 390-395, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 390-395
-
-
Lee, J.1
Wang, H.2
Andrews, J.G.3
Hong, D.4
-
24
-
-
84862622702
-
Cognitive amplify-and-forward relay networks over Nakagami-m fading
-
Jun.
-
T. Q. Duong, D. Benevides, M. Elkashlan, and V. Bao, "Cognitive amplify-and-forward relay networks over Nakagami-m fading," IEEE Trans. Veh. Tech., vol. 61, no. 5, pp. 2368-2374, Jun. 2012.
-
(2012)
IEEE Trans. Veh. Tech.
, vol.61
, Issue.5
, pp. 2368-2374
-
-
Duong, T.Q.1
Benevides, D.2
Elkashlan, M.3
Bao, V.4
-
25
-
-
84873887199
-
Outage analysis for underlay cognitive networks using incremental regenerative relaying
-
Feb.
-
K. Tourki, K. A. Qaraqe, M.-S. Alouini, "Outage analysis for underlay cognitive networks using incremental regenerative relaying," IEEE Trans. Veh. Tech., vol. 62, no. 2, pp. 721-734, Feb. 2013.
-
(2013)
IEEE Trans. Veh. Tech.
, vol.62
, Issue.2
, pp. 721-734
-
-
Tourki, K.1
Qaraqe, K.A.2
Alouini, M.-S.3
-
26
-
-
34247189646
-
Spectrum sharing for unlicensed bands
-
Apr.
-
R. Etkin, A. Parekh, and D. Tse, "Spectrum sharing for unlicensed bands," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 517-528, Apr. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.2
, pp. 517-528
-
-
Etkin, R.1
Parekh, A.2
Tse, D.3
-
27
-
-
0038363341
-
Diversity and multiplexing: A fundamental tradeoff in multiple antenna channels
-
May
-
L. Zheng and D. Tse, "Diversity and multiplexing: A fundamental tradeoff in multiple antenna channels," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1073C1096, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1073C1096
-
-
Zheng, L.1
Tse, D.2
-
28
-
-
84884537599
-
Optimal relay selection for physicallayer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
|