-
1
-
-
0033171330
-
Cognitive radio: Making software radios more personal
-
Aug.
-
J. Mitola and G. Q. Maguire, "Cognitive radio: Making software radios more personal," IEEE Pers. Commun., vol. 6, no. 4, pp. 13-18, Aug. 1999.
-
(1999)
IEEE Pers. Commun
, vol.6
, Issue.4
, pp. 13-18
-
-
Mitola, J.1
Maguire, G.Q.2
-
3
-
-
84861330060
-
Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead
-
May
-
G. Baldini, T. Sturman, A. R. Biswas, and R. Leschhorn, "Security aspects in software defined radio and cognitive radio networks: A survey and a way ahead," IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 355-379, May 2012.
-
(2012)
IEEE Commun. Surveys Tuts
, vol.14
, Issue.2
, pp. 355-379
-
-
Baldini, G.1
Sturman, T.2
Biswas, A.R.3
Leschhorn, R.4
-
4
-
-
21644436295
-
Implementation issues in spectrum sensing for cognitive radios
-
Nov.
-
D. Cabric, S. M. Mishra, and R. W. Brodersen, "Implementation issues in spectrum sensing for cognitive radios," in Proc. 38th Asil. Conf. Signal, Syst. Comput., Pacific Grove, CA, USA, Nov. 2004, pp. 772-776.
-
(2004)
Proc. 38th Asil. Conf. Signal, Syst. Comput., Pacific Grove, CA, USA
, pp. 772-776
-
-
Cabric, D.1
Mishra, S.M.2
Brodersen, R.W.3
-
5
-
-
77955017479
-
Cooperative spectrum sensing via belief propagation in spectrumheterogeneous cognitive radio systems
-
Apr
-
H. Li, "Cooperative spectrum sensing via belief propagation in spectrumheterogeneous cognitive radio systems," in Proc. IEEE WCNC, Sydney, N.S.W., Australia, Apr. 2010, pp. 1-6.
-
(2010)
Proc IEEE WCNC, Sydney, N.S.W., Australia
, pp. 1-6
-
-
Li, H.1
-
6
-
-
57149146164
-
Soft combination and detection for cooperative spectrum sensing in cognitive radio networks
-
Nov.
-
J.Ma, G. Zhao, and Y. Li, "Soft combination and detection for cooperative spectrum sensing in cognitive radio networks," IEEE Trans. Wireless Commun., vol. 7, no. 11, pp. 4502-4507, Nov. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.11
, pp. 4502-4507
-
-
Ma, J.1
Zhao, G.2
Li, Y.3
-
7
-
-
33847696923
-
Fundamental limits of spectrum-sharing in fading environments
-
Feb.
-
A. Ghasemi and E. S. Sousa, "Fundamental limits of spectrum-sharing in fading environments," IEEE Trans Wireless Commun., vol. 6, no. 2, pp. 649-658, Feb. 2007.
-
(2007)
IEEE Trans Wireless Commun
, vol.6
, Issue.2
, pp. 649-658
-
-
Ghasemi, A.1
Sousa, E.S.2
-
8
-
-
84861592810
-
Spectrum mobility games
-
Mar
-
R. Southwell, J. Huang, and X. Liu, "Spectrum mobility games," in Proc. 31st INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 37-45.
-
(2012)
Proc. 31st INFOCOM, Orlando, FL, USA
, pp. 37-45
-
-
Southwell, R.1
Huang, J.2
Liu, X.3
-
9
-
-
42649092608
-
A survey on spectrum management in cognitive radio networks
-
Apr.
-
I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, "A survey on spectrum management in cognitive radio networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 40-48, Apr. 2008.
-
(2008)
IEEE Commun. Mag
, vol.46
, Issue.4
, pp. 40-48
-
-
Akyildiz, I.F.1
Lee, W.-Y.2
Vuran, M.C.3
Mohanty, S.4
-
10
-
-
78449306498
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems part I: Known channel statistics
-
Nov.
-
H. Li and Z. Han, "Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems part I: Known channel statistics," IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3566-3577, Nov. 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.11
, pp. 3566-3577
-
-
Li, H.1
Han, Z.2
-
11
-
-
51349141382
-
Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment
-
Aug.
-
T. Brown and A. Sethi, "Potential cognitive radio denial-of-service vulnerabilities and protection countermeasures: A multi-dimensional analysis and assessment," in Proc. 2nd Int. Conf. CROWNCOM, Orlando, FL, USA, Aug. 2007, pp. 456-464.
-
(2007)
Proc. 2nd Int. Conf. CROWNCOM, Orlando, FL, USA
, pp. 456-464
-
-
Brown, T.1
Sethi, A.2
-
12
-
-
51849084704
-
Securing wireless data networks against eavesdropping using smart antennas
-
Jun.
-
S. Lakshmanan, C. Tsao, R. Sivakumar, and K. Sundaresan, "Securing wireless data networks against eavesdropping using smart antennas," in Proc. 28th ICDCS, Beijing, China, Jun. 2008, pp. 19-27.
-
(2008)
Proc. 28th ICDCS, Beijing, China
, pp. 19-27
-
-
Lakshmanan, S.1
Tsao, C.2
Sivakumar, R.3
Sundaresan, K.4
-
13
-
-
74549175881
-
Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs
-
Jan.
-
A. Olteanu and Y. Xiao, "Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs," IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 218-226, Jan. 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.1
, pp. 218-226
-
-
Olteanu, A.1
Xiao, Y.2
-
14
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Sep.
-
Y. Xiao, V. K. Rayi, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Comput. Commun., vol. 30, no. 11-12, pp. 2314-2341, Sep. 2007.
-
(2007)
Comput. Commun
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Du, X.3
Hu, F.4
Galloway, M.5
-
15
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
Aug.
-
A. Mukherjee, S. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Aug. 2014.
-
(2014)
IEEE Commun. Surveys Tuts
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.2
Huang, J.3
Swindlehurst, A.L.4
-
16
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
17
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
18
-
-
33749450172
-
Secrecy capacity of SIMO and slow fading channels
-
Sep.
-
P. Parada and R. Blahut, "Secrecy capacity of SIMO and slow fading channels," in Proc. IEEE ISIT, Adelaide, SA, Australia, Sep. 2005, pp. 2152-2155.
-
(2005)
Proc IEEE ISIT, Adelaide, SA, Australia
, pp. 2152-2155
-
-
Parada, P.1
Blahut, R.2
-
19
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. O. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.O.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
20
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.3
-
21
-
-
44049095075
-
Secret communication via multi-antenna transmission
-
Mar.
-
Z. Li, W. Trappe, and R. Yates, "Secret communication via multi-antenna transmission," in Proc. 41st Conf. Inf. Sci. Syst., Baltimore, MD, USA, Mar. 2007, pp. 905-910.
-
(2007)
Proc. 41st Conf. Inf. Sci. Syst., Baltimore, MD, USA
, pp. 905-910
-
-
Li, Z.1
Trappe, W.2
Yates, R.3
-
22
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
23
-
-
45249083184
-
Secure communication with a relay helping the wiretapper
-
Sep.
-
M. Yuksel and E. Erkip, "Secure communication with a relay helping the wiretapper," in Proc. IEEE Inf. Theory Workshop, Lake Tahoe, CA, USA, Sep. 2007, pp. 595-600.
-
(2007)
Proc IEEE Inf. Theory Workshop, Lake Tahoe, CA, USA
, pp. 595-600
-
-
Yuksel, M.1
Erkip, E.2
-
24
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
25
-
-
84884537599
-
Optimal relay selection for physical-layer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X.Wang, andW. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Shen, W.2
-
26
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
27
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I. Kim, and K. Dong, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.2
Dong, K.3
-
28
-
-
79952680469
-
Secure communication in multiantenna cognitive radio networks with imperfect channel state information
-
Apr.
-
Y. Pei, Y.-C. Liang, K. C. Teh, and K. Li, "Secure communication in multiantenna cognitive radio networks with imperfect channel state information," IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1683-1693, Apr. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.4
, pp. 1683-1693
-
-
Pei, Y.1
Liang, Y.-C.2
Teh, K.C.3
Li, K.4
-
29
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec.
-
Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
-
(2013)
IEEE Trans. Commun
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
30
-
-
84879072350
-
On physical layer security for cognitive radio networks
-
Jun.
-
Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Netw. Mag., vol. 27, no. 3, pp. 28-33, Jun. 2013.
-
(2013)
IEEE Netw. Mag
, vol.27
, Issue.3
, pp. 28-33
-
-
Shu, Z.1
Qian, Y.2
Ci, S.3
-
31
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jun.
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Tech., vol. 63, no. 6, pp. 2653-2661, Jun. 2014.
-
(2014)
IEEE Trans. Veh. Tech
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
32
-
-
0344666663
-
A sufficient condition based on the Cauchy-Schwarz inequality for efficient template matching
-
Sep.
-
L. Di Stefano and S. Mattoccia, "A sufficient condition based on the Cauchy-Schwarz inequality for efficient template matching," in Proc. Int. Conf. Image Process., Catalonia, Spain, Sep. 2003, pp. 269-272.
-
(2003)
Proc. Int. Conf. Image Process., Catalonia, Spain
, pp. 269-272
-
-
Di Stefano, L.1
Mattoccia, S.2
-
33
-
-
0003851729
-
-
New York, NY, USA: Dover
-
M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, Mathematical Tables, 9th ed. New York, NY, USA: Dover, 1970.
-
(1970)
Handbook of Mathematical Functions with Formulas, Graphs, Mathematical Tables, 9th Ed
-
-
Abramowitz, M.1
Stegun, I.A.2
-
34
-
-
84866740077
-
Diversity-multiplexing tradeoff in selective cooperation for cognitive radio
-
Sep.
-
Y. Zou, Y.-D. Yao, and B. Zheng, "Diversity-multiplexing tradeoff in selective cooperation for cognitive radio," IEEE Trans. Commun., vol. 60, no. 9, pp. 2467-2481, Sep. 2012.
-
(2012)
IEEE Trans. Commun
, vol.60
, Issue.9
, pp. 2467-2481
-
-
Zou, Y.1
Yao, Y.-D.2
Zheng, B.3
-
35
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
36
-
-
84867873837
-
Artificial noise by the receiver: Outage secrecy capacity/region analysis
-
Oct.
-
W. Li, M. Ghogho, B. Chen, and C. Xiong, "Artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
-
(2012)
IEEE Commun. Lett
, vol.16
, Issue.10
, pp. 1628-1631
-
-
Li, W.1
Ghogho, M.2
Chen, B.3
Xiong, C.4
|