-
1
-
-
80052406591
-
Survey of security issues in cognitive radio networks
-
W. El-Hajj, H. Safa, and M. Guizani, "Survey of security issues in cognitive radio networks," J. Internet Tech., Vol. 12, no. 2, pp. 181-198, 2011.
-
(2011)
J. Internet Tech.
, vol.12
, Issue.2
, pp. 181-198
-
-
El-Hajj, W.1
Safa, H.2
Guizani, M.3
-
2
-
-
67349259569
-
Breaking spectrum gridlock with cognitive radios: An information theoretic perspective
-
May
-
A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: An information theoretic perspective," Proc. IEEE, Vol. 97, no. 5, pp. 894-914, May. 2009.
-
(2009)
Proc. IEEE
, vol.97
, Issue.5
, pp. 894-914
-
-
Goldsmith, A.1
Jafar, S.A.2
Maric, I.3
Srinivasa, S.4
-
3
-
-
84898685324
-
Opportunistic user association for multi-service hetnets using nash bargaining solution
-
Mar.
-
D. Liu, Y. Chen, K. K. Chai, T. Zhang, and M. Elkashlan, "Opportunistic user association for multi-service hetnets using nash bargaining solution," IEEE Commun. Lett., Vol. 18, no. 3, pp. 463-466, Mar. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.3
, pp. 463-466
-
-
Liu, D.1
Chen, Y.2
Chai, K.K.3
Zhang, T.4
Elkashlan, M.5
-
4
-
-
84879072350
-
On physical layer security for cognitive radio networks
-
Jun.
-
Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Netw., Vol. 27, no. 3, pp. 28-33, Jun. 2013.
-
(2013)
IEEE Netw.
, vol.27
, Issue.3
, pp. 28-33
-
-
Shu, Z.1
Qian, Y.2
Ci, S.3
-
5
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Nice, France, Jun
-
S. Shafiee and S. Ulukus, "Achievable rates in gaussian MISO channels with secrecy constraints," in Proc. IEEE ISIT, Nice, France, Jun. 2007, pp. 2466-2470.
-
(2007)
Proc. IEEE ISIT
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
6
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., Vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
7
-
-
84855923041
-
Secure communication in stochastic wireless networks - Part I: Connectivity
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks - part I: Connectivity," IEEE Trans. Inf. Forensics Security, Vol. 7, no. 1, pp. 125-138, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 125-138
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
8
-
-
84903148893
-
Physical layer security in downlink multi-antenna cellular networks
-
Jun.
-
G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, and I. B. Collings, "Physical layer security in downlink multi-antenna cellular networks," IEEE Trans. Commun., Vol. 62, no. 6, pp. 2006-2021, Jun. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.6
, pp. 2006-2021
-
-
Geraci, G.1
Dhillon, H.S.2
Andrews, J.G.3
Yuan, J.4
Collings, I.B.5
-
9
-
-
78650414067
-
An overview of the transmission capacity of wireless networks
-
Dec.
-
S. Weber, J. G. Andrews, and N. Jindal, "An overview of the transmission capacity of wireless networks," IEEE Trans. Commun., Vol. 58, no. 12, pp. 3593-3604, Dec. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.12
, pp. 3593-3604
-
-
Weber, S.1
Andrews, J.G.2
Jindal, N.3
-
10
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless networks
-
Sep.
-
M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., Vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Andrews, J.G.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
-
11
-
-
84919662237
-
Breaking the area spectral efficiency wall in cognitive underlay networks
-
Feb.
-
S. A. R. Zaidi, D. C. McLernon, and M. Ghogho, "Breaking the area spectral efficiency wall in cognitive underlay networks," IEEE J. Sel. Areas Commun., Vol. 32, no. 11, pp. 1-17, Feb. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.11
, pp. 1-17
-
-
Zaidi, S.A.R.1
McLernon, D.C.2
Ghogho, M.3
-
12
-
-
85028099494
-
Interference and outage in poisson cognitive networks
-
Apr.
-
C. han Lee and M. Haenggi, "Interference and outage in poisson cognitive networks," IEEE Trans. Wireless Commun., Vol. 11, no. 4, pp. 1392-1401, Apr. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.4
, pp. 1392-1401
-
-
Han Lee, C.1
Haenggi, M.2
-
13
-
-
84887058800
-
Enhancing secrecy with multiantenna transmission in wireless ad hoc networks
-
Nov.
-
X. Zhang, X. Zhou, and M. R. McKay, "Enhancing secrecy with multiantenna transmission in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, Vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1802-1814
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
14
-
-
85010046244
-
Stochastic geometry and its applications
-
D. Stoyan, W. Kendall, and J. Mecke, "Stochastic geometry and its applications," Wiley New York, Vol. 2, 1987.
-
(1987)
Wiley New York
, vol.2
-
-
Stoyan, D.1
Kendall, W.2
Mecke, J.3
-
15
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., Vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
16
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., Vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
17
-
-
84893403880
-
Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
-
Feb.
-
L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, Vol. 9, no. 2, pp. 247-258, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.2
, pp. 247-258
-
-
Wang, L.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
|