-
1
-
-
84856043672
-
A mathematical theory of communication
-
[1] Shannon, C.E., A mathematical theory of communication. Bell Syst. Tech. J. 27 (1948), 379–423.
-
(1948)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
2
-
-
0016562514
-
The wire-tap channel
-
[2] Wyner, A.D., The wire-tap channel. Bell Sys. Tech. J. 54 (1975), 1355–1387.
-
(1975)
Bell Sys. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
0028423534
-
Decentralized learning of nash equilibria in multi-person stochastic games with incomplete information
-
[4] Sastry, P.S., Phansalkar, V.V., Thathachar, M.A.L., Decentralized learning of nash equilibria in multi-person stochastic games with incomplete information. IEEE Trans. Syst., Man, Cybern. 24 (1994), 769–777.
-
(1994)
IEEE Trans. Syst., Man, Cybern.
, vol.24
, pp. 769-777
-
-
Sastry, P.S.1
Phansalkar, V.V.2
Thathachar, M.A.L.3
-
6
-
-
20444502586
-
Quasi-variational inequalities, generalized nash equilibria, and multi-leader-follower games
-
[6] Pang, J.S., Fukushima, M., Quasi-variational inequalities, generalized nash equilibria, and multi-leader-follower games. Comput. Manag. Sci. 1 (2005), 21–56.
-
(2005)
Comput. Manag. Sci.
, vol.1
, pp. 21-56
-
-
Pang, J.S.1
Fukushima, M.2
-
7
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
[7] Goel, S., Negi, R., Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7 (2008), 2180–2189.
-
(2008)
IEEE Trans. Wirel. Commun.
, vol.7
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
8
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
[8] Krikidis, I., Thompson, J.S., McLaughlin, S., Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 8 (2009), 5003–5011.
-
(2009)
IEEE Trans. Wirel. Commun.
, vol.8
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
9
-
-
67349148536
-
Distributed relay selection and power control for multiuser cooperative communication networks using stackelberg game
-
[9] Wang, B., Han, Z., Liu, K.J.R., Distributed relay selection and power control for multiuser cooperative communication networks using stackelberg game. IEEE Trans. Mobile Comput. 8 (2009), 975–990.
-
(2009)
IEEE Trans. Mobile Comput.
, vol.8
, pp. 975-990
-
-
Wang, B.1
Han, Z.2
Liu, K.J.R.3
-
10
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
[10] Dong, L., Han, Z., Petropulu, A.P., Poor, H.V., Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58 (2010), 1875–1888.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
12
-
-
85027929481
-
Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting
-
[12] Ding, Z., Leung, K.K., Goeckel, D.L., Towsley, D., Opportunistic relaying for secrecy communications: cooperative jamming vs. relay chatting. IEEE Trans. Wirel. Commun. 10 (2011), 1725–1729.
-
(2011)
IEEE Trans. Wirel. Commun.
, vol.10
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
13
-
-
78651487833
-
Joint pricing and power allocation for dynamic spectrum access networks with stackelberg game model
-
[13] Wu, Y., Zhang, T., Tsang, D.H.K., Joint pricing and power allocation for dynamic spectrum access networks with stackelberg game model. IEEE Trans. Wirel. Commun. 10 (2011), 12–19.
-
(2011)
IEEE Trans. Wirel. Commun.
, vol.10
, pp. 12-19
-
-
Wu, Y.1
Zhang, T.2
Tsang, D.H.K.3
-
14
-
-
84866500478
-
Power allocation and pricing in multiuser relay networks using stackelberg and bargaining game
-
[14] Cao, Q., Zhao, H.V., Jing, Y., Power allocation and pricing in multiuser relay networks using stackelberg and bargaining game. IEEE Trans. Veh. Technol. 61 (2012), 3177–3190.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, pp. 3177-3190
-
-
Cao, Q.1
Zhao, H.V.2
Jing, Y.3
-
15
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
[15] Wang, H., Yin, Q., Xia, X.G., Distributed beamforming for physical-layer security of two-way relay networks. IEEE Trans. Signal Process. 60 (2012), 3532–3545.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, pp. 3532-3545
-
-
Wang, H.1
Yin, Q.2
Xia, X.G.3
-
16
-
-
84863935030
-
Indirect reciprocity security game for large-scale wireless networks
-
[16] Xiao, L., Chen, Y., Lin, W., Liu, K.J.R., Indirect reciprocity security game for large-scale wireless networks. IEEE Trans. Inf. Forensics Secur. 7 (2012), 1368–1380.
-
(2012)
IEEE Trans. Inf. Forensics Secur.
, vol.7
, pp. 1368-1380
-
-
Xiao, L.1
Chen, Y.2
Lin, W.3
Liu, K.J.R.4
-
17
-
-
84886690062
-
Energy-efficient distributed relay and power control in cognitive radio cooperative communications
-
[17] Luo, C., Min, G., Yu, F.R., Chen, M., Yang, L.T., Leung, V.C.M., Energy-efficient distributed relay and power control in cognitive radio cooperative communications. IEEE J. Select. Areas Commun. 31 (2013), 2442–2452.
-
(2013)
IEEE J. Select. Areas Commun.
, vol.31
, pp. 2442-2452
-
-
Luo, C.1
Min, G.2
Yu, F.R.3
Chen, M.4
Yang, L.T.5
Leung, V.C.M.6
-
18
-
-
84886678162
-
Efficient resource allocation for cognitive radio networks with cooperetive relays
-
[18] Wang, S., Ge, M., Wang, C., Efficient resource allocation for cognitive radio networks with cooperetive relays. IEEE J. Select. Areas Commun. 31 (2013), 2432–2441.
-
(2013)
IEEE J. Select. Areas Commun.
, vol.31
, pp. 2432-2441
-
-
Wang, S.1
Ge, M.2
Wang, C.3
-
19
-
-
84877845302
-
Joint power and bandwidth allocation for amplify-and-forward cooperative communications using stackelberg game
-
[19] Al-Tous, H., Barhumi, I., Joint power and bandwidth allocation for amplify-and-forward cooperative communications using stackelberg game. IEEE Trans. Veh. Technol. 62 (2013), 1678–1691.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, pp. 1678-1691
-
-
Al-Tous, H.1
Barhumi, I.2
-
20
-
-
84878651233
-
Full-duplex cooperative cognitive radio with transmit imperfections
-
[20] Zheng, G., Krikidis, I., Ottersten, B., Full-duplex cooperative cognitive radio with transmit imperfections. IEEE Trans. Wirel. Commun. 12 (2013), 2498–2511.
-
(2013)
IEEE Trans. Wirel. Commun.
, vol.12
, pp. 2498-2511
-
-
Zheng, G.1
Krikidis, I.2
Ottersten, B.3
-
21
-
-
84898480467
-
Tuberculosis disease diagnosis using artificial immune recognition system
-
[21] Shamshirband, S., Hessam, S., Javidnia, H., Amiribesheli, M., Vahdat, S., Petkovic, D., Gani, A., Kiah, M., Tuberculosis disease diagnosis using artificial immune recognition system. Int. J. Med. Sci. 11:5 (2014), 508–514.
-
(2014)
Int. J. Med. Sci.
, vol.11
, Issue.5
, pp. 508-514
-
-
Shamshirband, S.1
Hessam, S.2
Javidnia, H.3
Amiribesheli, M.4
Vahdat, S.5
Petkovic, D.6
Gani, A.7
Kiah, M.8
-
22
-
-
84900419562
-
Cooperative game theoretic approach using fuzzy q-learning for detecting and preventing intrusions in wireless sensor networks
-
[22] Shamshirband, S., Patel, A., Anuar, N., Kiah, M., Abraham, A., Cooperative game theoretic approach using fuzzy q-learning for detecting and preventing intrusions in wireless sensor networks. Eng. Appl. Artif. Intell. 32 (2014), 228–241.
-
(2014)
Eng. Appl. Artif. Intell.
, vol.32
, pp. 228-241
-
-
Shamshirband, S.1
Patel, A.2
Anuar, N.3
Kiah, M.4
Abraham, A.5
-
23
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
[23] Zou, Y., Wang, X., Shen, W., Hanzo, L., Security versus reliability analysis of opportunistic relaying. IEEE Trans. Veh. Technol. 63 (2014), 2653–2661.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
24
-
-
84911167162
-
A novel group key transfer for big data security
-
[24] Hsu, C., Zeng, B., Zhang, M., A novel group key transfer for big data security. Appl. Math. Comput. 249 (2014), 436–443.
-
(2014)
Appl. Math. Comput.
, vol.249
, pp. 436-443
-
-
Hsu, C.1
Zeng, B.2
Zhang, M.3
-
25
-
-
85045466762
-
-
Springer Briefs in Computer Science
-
[25] Zhang, N., Mark, J.W., Security-aware cooperation in cognitive radio networks, 2014, Springer Briefs in Computer Science, 43–68.
-
(2014)
Security-aware cooperation in cognitive radio networks
, pp. 43-68
-
-
Zhang, N.1
Mark, J.W.2
-
26
-
-
84940533198
-
Hyperchaotic encryption based on multi-scroll piecewise linear systems
-
[26] Garca-Martnez, M., Ontarin-Garca, L.J., Campos-Cantn, E., celikovsky, S., Hyperchaotic encryption based on multi-scroll piecewise linear systems. Appl. Math. Comput. 270 (2015), 413–424.
-
(2015)
Appl. Math. Comput.
, vol.270
, pp. 413-424
-
-
Garca-Martnez, M.1
Ontarin-Garca, L.J.2
Campos-Cantn, E.3
celikovsky, S.4
-
27
-
-
84925066114
-
Secrecy capacity optimization via cooperative relaying and jamming for WANETs
-
[27] Han, B., Li, J., Su, J., Guo, M., Zhao, B., Secrecy capacity optimization via cooperative relaying and jamming for WANETs. IEEE Trans. Parallel Distrib. Syst. 26 (2015), 1117–1128.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, pp. 1117-1128
-
-
Han, B.1
Li, J.2
Su, J.3
Guo, M.4
Zhao, B.5
-
28
-
-
84942610432
-
Complex dynamics analysis for a duopoly stackelberg game model with bounded rationality
-
[28] Peng, Y., Lu, Q., Complex dynamics analysis for a duopoly stackelberg game model with bounded rationality. Appl. Math. Comput. 271 (2015), 259–268.
-
(2015)
Appl. Math. Comput.
, vol.271
, pp. 259-268
-
-
Peng, Y.1
Lu, Q.2
-
29
-
-
84922599877
-
Appraisal of adaptive neuro-fuzzy computing technique for estimating anti-obesity properties of a medicinal plant
-
[29] Kazemipoor, M., Hajifaraji, M., Radzi, C., Shamshirband, S., Petkovic, D., Kiah, M., Appraisal of adaptive neuro-fuzzy computing technique for estimating anti-obesity properties of a medicinal plant. Comput. Methods Programs Biomed. 118 (2015), 69–76.
-
(2015)
Comput. Methods Programs Biomed.
, vol.118
, pp. 69-76
-
-
Kazemipoor, M.1
Hajifaraji, M.2
Radzi, C.3
Shamshirband, S.4
Petkovic, D.5
Kiah, M.6
-
30
-
-
84963682665
-
One-to-many authentication for access control in mobile pay-tv systems
-
[30] He, D., Zeadally, S., Kumar, N., Lee, J., One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci., 59, 2016, 10.1007/s11432-015-5469-5.
-
(2016)
Sci. China Inf. Sci.
, vol.59
-
-
He, D.1
Zeadally, S.2
Kumar, N.3
Lee, J.4
-
31
-
-
84964246143
-
Anonymous authentication for wireless body area networks with provable security
-
[31] He, D., Zeadally, S., Kumar, N., Lee, J., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 9 (2016), 1–12, 10.1109/JSYST.2016.2544805.
-
(2016)
IEEE Syst. J.
, vol.9
, pp. 1-12
-
-
He, D.1
Zeadally, S.2
Kumar, N.3
Lee, J.4
-
32
-
-
84964349574
-
Fifty years of graph matching, network alignment and network comparison
-
[32] Emmert-Streib, F., Dehmer, M., Shi, Y., Fifty years of graph matching, network alignment and network comparison. Inf. Sci. 346–347 (2016), 180–197.
-
(2016)
Inf. Sci.
, vol.346-347
, pp. 180-197
-
-
Emmert-Streib, F.1
Dehmer, M.2
Shi, Y.3
-
33
-
-
84954176777
-
On wiener polarity index of bicyclic networks
-
[33] Ma, J., Shi, Y., Wang, Z., Yue, J., On wiener polarity index of bicyclic networks. Sci. Rep., 6, 2016, 19066, 10.1038/srep19066.
-
(2016)
Sci. Rep.
, vol.6
, pp. 19066
-
-
Ma, J.1
Shi, Y.2
Wang, Z.3
Yue, J.4
|