-
1
-
-
84858121087
-
Design aspects of network assisted device-to-device communications
-
Mar.
-
G. Fodor et al., "Design aspects of network assisted device-to-device communications," IEEE Commun. Mag., vol. 50, no. 3, pp. 170-177, Mar. 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.3
, pp. 170-177
-
-
Fodor, G.1
-
2
-
-
72949120015
-
Device-todevice communication as an underlay to LTE-advanced networks
-
Dec.
-
K. Doppler, M. Rinne, C. Wijting, C. Ribeiro, and K. Hugl, "Device-todevice communication as an underlay to LTE-advanced networks," IEEE Commun. Mag., vol. 47, no. 12, pp. 42-49, Dec. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.12
, pp. 42-49
-
-
Doppler, K.1
Rinne, M.2
Wijting, C.3
Ribeiro, C.4
Hugl, K.5
-
3
-
-
84953281541
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
L. Song, D. Niyato, Z. Han, and E. Hossain, Wireless Device-to-Device Communications and Networks. Cambridge, U.K.: Cambridge Univ. Press, 2013.
-
(2013)
Wireless Device-to-Device Communications and Networks
-
-
Song, L.1
Niyato, D.2
Han, Z.3
Hossain, E.4
-
7
-
-
84893854826
-
Efficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach
-
Sep.
-
C. Xu et al., "Efficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 348-358, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 348-358
-
-
Xu, C.1
-
8
-
-
84875631603
-
Spectrum sharing scheme between cellular users and Ad-hoc device-to-device users
-
Mar.
-
B. Kaufman, J. Lilleberg, and B. Aazhang, "Spectrum sharing scheme between cellular users and Ad-Hoc device-to-device users," IEEE Trans. Wireless Commun., vol. 12, no. 3, pp. 1038-1049, Mar. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.3
, pp. 1038-1049
-
-
Kaufman, B.1
Lilleberg, J.2
Aazhang, B.3
-
9
-
-
84881369407
-
Resource allocation for device-to-device communications overlaying two-way cellular networks
-
Jul.
-
Y. Pei and Y.-C. Liang, "Resource allocation for device-to-device communications overlaying two-way cellular networks," IEEE Trans. Wireless Commun., vol. 12, no. 7, pp. 3611-3621, Jul. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.7
, pp. 3611-3621
-
-
Pei, Y.1
Liang, Y.-C.2
-
10
-
-
84916897705
-
On applying network coding in network assisted device-to-device communications
-
May
-
G. Fodor, A. Pradini, and A. Gattami, "On applying network coding in network assisted device-to-device communications," in Proc. Eur. Wireless Conf., May 2014, pp. 1-6.
-
(2014)
Proc. Eur. Wireless Conf.
, pp. 1-6
-
-
Fodor, G.1
Pradini, A.2
Gattami, A.3
-
11
-
-
79951679288
-
Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks
-
Feb.
-
H. Min, W. Seo, J. Lee, S. Park, and D. Hong, "Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 413-418, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 413-418
-
-
Min, H.1
Seo, W.2
Lee, J.3
Park, S.4
Hong, D.5
-
12
-
-
84904129649
-
Cooperative relaying schemes for device-to-device communication underlaying cellular networks
-
Dec.
-
C. Ma et al., "Cooperative relaying schemes for device-to-device communication underlaying cellular networks," in Proc. IEEE GLOBECOM, Dec. 2013, pp. 3995-4000.
-
(2013)
Proc. IEEE GLOBECOM
, pp. 3995-4000
-
-
Ma, C.1
-
13
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
14
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
15
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
16
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevic, and H. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.4
-
17
-
-
84890430700
-
Secrecy-based access control for device-to-device communication underlaying cellular networks
-
Nov.
-
J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks," IEEE Commun. Lett., vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.11
, pp. 2068-2071
-
-
Yue, J.1
Ma, C.2
Yu, H.3
Zhou, W.4
-
18
-
-
84876479369
-
RISE: A reliable and secure scheme for wireless machine to machine communications
-
Feb.
-
W. Ren, L. Yu, L. Ma, and Y. Ren, "RISE: A reliable and secure scheme for wireless machine to machine communications," Tsinghua Sci. Technol., vol. 18, no. 1, pp. 100-117, Feb. 2013.
-
(2013)
Tsinghua Sci. Technol.
, vol.18
, Issue.1
, pp. 100-117
-
-
Ren, W.1
Yu, L.2
Ma, L.3
Ren, Y.4
-
20
-
-
52349086199
-
The secrecy graph and some of its properties
-
Jul.
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE ISIT, Jul. 2008, pp. 539-543.
-
(2008)
Proc. IEEE ISIT
, pp. 539-543
-
-
Haenggi, M.1
-
21
-
-
84855923041
-
Secure communication in stochastic wireless networks
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 125-138, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 125-138
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
22
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjorungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjorungnes, A.4
-
23
-
-
84880159277
-
Physical layer security in cellular networks: A stochastic geometry approach
-
Jun.
-
H. Wang, X. Zhou, and M. Reed, "Physical layer security in cellular networks: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, Jun. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2776-2787
-
-
Wang, H.1
Zhou, X.2
Reed, M.3
-
24
-
-
84894743905
-
Asymptotic analysis on secrecy capacity in large-scale wireless networks
-
Feb.
-
J. Zhang, L. Fu, and X. Wang, "Asymptotic analysis on secrecy capacity in large-scale wireless networks," IEEE/ACM Trans. Netw., vol. 22, no. 1, pp. 66-79, Feb. 2014.
-
(2014)
IEEE/ACM Trans. Netw.
, vol.22
, Issue.1
, pp. 66-79
-
-
Zhang, J.1
Fu, L.2
Wang, X.3
-
25
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless networks
-
Sep.
-
M. Haenggi, J. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Andrews, J.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
-
26
-
-
31744449612
-
An aloha protocol for multihop mobile wireless networks
-
Feb.
-
F. Baccelli, B. Blaszczyszyn, and P. Muhlethaler, "An aloha protocol for multihop mobile wireless networks," IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 421-436, Feb. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.2
, pp. 421-436
-
-
Baccelli, F.1
Blaszczyszyn, B.2
Muhlethaler, P.3
-
27
-
-
84856846185
-
Transmission capacity of ad-hoc networks with multiple antennas using transmit stream adaptation and interference cancellation
-
Feb.
-
R. Vaze and R. Heath, "Transmission capacity of ad-hoc networks with multiple antennas using transmit stream adaptation and interference cancellation," IEEE Trans. Inf. Theory, vol. 58, no. 2, pp. 780-792, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.2
, pp. 780-792
-
-
Vaze, R.1
Heath, R.2
-
28
-
-
82455167943
-
A tractable approach to coverage and rate in cellular networks
-
Nov.
-
J. Andrews, F. Baccelli, and R. Ganti, "A tractable approach to coverage and rate in cellular networks," IEEE Trans. Commun., vol. 59, no. 11, pp. 3122-3134, Nov. 2011.
-
(2011)
IEEE Trans. Commun.
, vol.59
, Issue.11
, pp. 3122-3134
-
-
Andrews, J.1
Baccelli, F.2
Ganti, R.3
-
29
-
-
84859052098
-
Modeling and analysis of k-tier downlink heterogeneous cellular networks
-
Apr.
-
H. Dhillon, R. Ganti, F. Baccelli, and J. Andrews, "Modeling and analysis of k-tier downlink heterogeneous cellular networks," IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550-560, Apr. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.3
, pp. 550-560
-
-
Dhillon, H.1
Ganti, R.2
Baccelli, F.3
Andrews, J.4
-
30
-
-
84904137444
-
Optimal spectrum partition and mode selection in device-to-device overlaid cellular networks
-
Dec.
-
X. Lin and J. G. Andrews, "Optimal spectrum partition and mode selection in device-to-device overlaid cellular networks," in Proc. IEEE GLOBECOM, Dec. 2013, pp. 1837-1842.
-
(2013)
Proc. IEEE GLOBECOM
, pp. 1837-1842
-
-
Lin, X.1
Andrews, J.G.2
-
31
-
-
84906242214
-
Modeling, analysis and optimization of multicast device-to-device transmissions
-
Aug.
-
X. Lin, R. Ratasuk, A. Ghosh, and J. Andrews, "Modeling, analysis and optimization of multicast device-to-device transmissions," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4346-4359, Aug. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.8
, pp. 4346-4359
-
-
Lin, X.1
Ratasuk, R.2
Ghosh, A.3
Andrews, J.4
-
32
-
-
84904088598
-
Device-todevice modeling and analysis with a modified matern hardcore BS location model
-
Dec.
-
Q. Ye, M. Al-Shalash, C. Caramanis, and J. G. Andrews, "Device-todevice modeling and analysis with a modified matern hardcore BS location model," in Proc. IEEE GLOBECOM, Dec. 2013, pp. 1825-1830.
-
(2013)
Proc. IEEE GLOBECOM
, pp. 1825-1830
-
-
Ye, Q.1
Al-Shalash, M.2
Caramanis, C.3
Andrews, J.G.4
-
33
-
-
84871945106
-
Secure node packing of large-scale wireless networks
-
Jun.
-
J. Lee, H. Shin, and M. Win, "Secure node packing of large-scale wireless networks," in Proc. IEEE ICC, Jun. 2012, pp. 815-819.
-
(2012)
Proc. IEEE ICC
, pp. 815-819
-
-
Lee, J.1
Shin, H.2
Win, M.3
-
34
-
-
84883430599
-
Distributed network secrecy
-
Sep.
-
J. Lee, A. Conti, A. Rabbachin, and M. Z. Win, "Distributed network secrecy," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1889-1900, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1889-1900
-
-
Lee, J.1
Conti, A.2
Rabbachin, A.3
Win, M.Z.4
|