-
1
-
-
72949120015
-
Deviceto-device communication as an underlay to LTE-Advanced networks
-
Dec.
-
K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, "Deviceto-device communication as an underlay to LTE-Advanced networks, " IEEE Communications Magazine, vol. 47, no. 12, pp. 42-49, Dec. 2009.
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.12
, pp. 42-49
-
-
Doppler, K.1
Rinne, M.2
Wijting, C.3
Ribeiro, C.B.4
Hugl, K.5
-
2
-
-
84355161968
-
Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks
-
Dec.
-
H. Min, J. Lee, S. Park, and D. Hong, "Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks, " IEEE Transactions on Wireless Communications, vol. 10, no. 12, pp. 3995-4000, Dec. 2011.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.12
, pp. 3995-4000
-
-
Min, H.1
Lee, J.2
Park, S.3
Hong, D.4
-
3
-
-
84860393847
-
Resource shaing optimization for device-to-device communication underlaying cellular networks
-
Aug.
-
C.-H. Yu, K. Doppler, C. B. Ribeiro, and O. Tirkkonen, "Resource shaing optimization for device-to-device communication underlaying cellular networks, " IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2752-2763, Aug. 2011.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, Issue.8
, pp. 2752-2763
-
-
Yu, C.-H.1
Doppler, K.2
Ribeiro, C.B.3
Tirkkonen, O.4
-
4
-
-
84881590269
-
Interference-aware graph based resource sharing for device-to-device communications underlaying cellular networks
-
Shanghai, China, Apr.
-
R. Zhang, X. Cheng, L. Yang, and B. Jiao, "Interference-aware graph based resource sharing for device-to-device communications underlaying cellular networks, " in Proc. IEEE WCNC 2013, Shanghai, China, Apr. 2013.
-
(2013)
Proc. IEEE WCNC 2013
-
-
Zhang, R.1
Cheng, X.2
Yang, L.3
Jiao, B.4
-
5
-
-
84939553981
-
Interference graph based resource allocation (InGRA) for D2D communications underlaying cellular networks
-
Aug.
-
R. Zhang, X. Cheng, L. Yang, and B. Jiao, "Interference graph based resource allocation (InGRA) for D2D communications underlaying cellular networks, " IEEE Transactions on Vehicular Technology, vol. 64, no. 8, pp. 3844-3850, Aug. 2015.
-
(2015)
IEEE Transactions on Vehicular Technology
, vol.64
, Issue.8
, pp. 3844-3850
-
-
Zhang, R.1
Cheng, X.2
Yang, L.3
Jiao, B.4
-
6
-
-
84886694749
-
Interference graph based resource sharing schemes for vehicular networks
-
Oct.
-
R. Zhang, X. Cheng, Q. Yao, C.-X. Wang, Y. Yang, and B. Jiao, "Interference graph based resource sharing schemes for vehicular networks, " IEEE Transactions on Vehicular Technology, vol. 62, no. 8, pp. 4028-4039, Oct. 2013.
-
(2013)
IEEE Transactions on Vehicular Technology
, vol.62
, Issue.8
, pp. 4028-4039
-
-
Zhang, R.1
Cheng, X.2
Yao, Q.3
Wang, C.-X.4
Yang, Y.5
Jiao, B.6
-
7
-
-
84923299396
-
D2D channel measurements and models: A survey
-
Mar.
-
X. Cheng, Y. Li, B. Ai, X. Yin, and Q. Wang, "D2D channel measurements and models: A survey, " IET Communications, vol. 9, no. 3, pp. 312-325, Mar. 2015.
-
(2015)
IET Communications
, vol.9
, Issue.3
, pp. 312-325
-
-
Cheng, X.1
Li, Y.2
Ai, B.3
Yin, X.4
Wang, Q.5
-
8
-
-
84938102289
-
D2D for intelligent transportation systems: A feasibility study
-
Aug.
-
X. Cheng, L. Yang, and X. Shen, "D2D for intelligent transportation systems: A feasibility study, " IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 4, pp. 1784-1793, Aug. 2015.
-
(2015)
IEEE Transactions on Intelligent Transportation Systems
, vol.16
, Issue.4
, pp. 1784-1793
-
-
Cheng, X.1
Yang, L.2
Shen, X.3
-
9
-
-
84890430700
-
Secrecy-based access control for device-to-device communication underlaying cellular networks
-
Nov.
-
J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks, " IEEE Communications Letters, vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
-
(2013)
IEEE Communications Letters
, vol.17
, Issue.11
, pp. 2068-2071
-
-
Yue, J.1
Ma, C.2
Yu, H.3
Zhou, W.4
-
10
-
-
84907003865
-
Radio resource allocation for physical-layer security in D2D underlay communications
-
Sydney, Australia, Jun.
-
H. Zhang, T. Wang, L. Song, and Z. Han, "Radio resource allocation for physical-layer security in D2D underlay communications, " in Proc. IEEE ICC 2014, Sydney, Australia, Jun. 2014.
-
(2014)
Proc. IEEE ICC 2014
-
-
Zhang, H.1
Wang, T.2
Song, L.3
Han, Z.4
-
11
-
-
84905227083
-
Device-to-device communications: The physical layer security advantage
-
Florence, Italy, May
-
D. Zhu, A. L. Swindlehurst, S. Ali A. Fakoorian, W. Xu, and C. Zhao, "Device-to-device communications: The physical layer security advantage, " in Proc. IEEE ICASSP 2014, Florence, Italy, May 2014.
-
(2014)
Proc. IEEE ICASSP 2014
-
-
Zhu, D.1
Swindlehurst, A.L.2
Ali Fakoorian A, S.3
Xu, W.4
Zhao, C.5
-
12
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel, " IEEE Transactions on Information Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
14
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sept.
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy, " IEEE Transactions on Information Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
15
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays, " IEEE Transactions on Signal Processing, vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Transactions on Signal Processing
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
16
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct.
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers, " IEEE Transactions on Vehicular Technology, vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Transactions on Vehicular Technology
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
17
-
-
85032772246
-
Coalitional game theory for communication networks
-
Sep.
-
W. Saad, Z. Han, M. Debbah, A. Hjørungnes, and T. Basar, "Coalitional game theory for communication networks, " IEEE Signal Processing Magazine, vol. 26, no. 9, pp. 77-97, Sep. 2009.
-
(2009)
IEEE Signal Processing Magazine
, vol.26
, Issue.9
, pp. 77-97
-
-
Saad, W.1
Han, Z.2
Debbah, M.3
Hjørungnes, A.4
Basar, T.5
|