-
1
-
-
84902982079
-
Device-to-device data storage for mobile cellular systems
-
Dec.
-
J. Paäkkönen, C. Hollanti, O. Tirkkonen, "Device-to-device data storage for mobile cellular systems, " in Proc. IEEE GLOBECOMWorkshops, Dec. 2013, pp. 671-676.
-
(2013)
Proc. IEEE GLOBECOMWorkshops
, pp. 671-676
-
-
Paäkkönen, J.1
Hollanti, C.2
Tirkkonen, O.3
-
2
-
-
84906079345
-
Living on the edge: The role of proactive caching in 5G wireless networks
-
Aug.
-
E. Bastug, M. Bennis, M. Debbah, "Living on the edge: The role of proactive caching in 5G wireless networks, " IEEE Commun. Mag., vol. 52, no. 8, pp. 82-89, Aug. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.8
, pp. 82-89
-
-
Bastug, E.1
Bennis, M.2
Debbah, M.3
-
3
-
-
84979799702
-
Wireless distributed storage in socially enabled D2D communications
-
Mar.
-
L. Wang, H. Wu, Z. Han, "Wireless distributed storage in socially enabled D2D communications, " IEEE Access, doi: 10. 1109/ACCESS. 2016. 2546685, Mar. 2016.
-
(2016)
IEEE Access
-
-
Wang, L.1
Wu, H.2
Han, Z.3
-
4
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
5
-
-
84953708676
-
Secrecy-oriented partner selection based on social trust in device-to-device communications
-
Jun. 8-12
-
L. Wang, H. Wu, L. Liu, M. Song, Y. Cheng, "Secrecy-oriented partner selection based on social trust in device-to-device communications, " in Proc. IEEE ICC, London, U. K., Jun. 8-12, 2015, pp. 7275-7279.
-
(2015)
Proc. IEEE ICC, London, U. K.
, pp. 7275-7279
-
-
Wang, L.1
Wu, H.2
Liu, L.3
Song, M.4
Cheng, Y.5
-
6
-
-
84948434446
-
Exploiting social ties for cooperative D2D communications: A mobile social networking case
-
Oct.
-
X. Chen, B. Proulx, X. Gong, J. Zhang, "Exploiting social ties for cooperative D2D communications: A mobile social networking case, " IEEE/ACM Trans. Netw., vol. 23, no. 5, pp. 1471-1484, Oct. 2015.
-
(2015)
IEEE/ACM Trans. Netw.
, vol.23
, Issue.5
, pp. 1471-1484
-
-
Chen, X.1
Proulx, B.2
Gong, X.3
Zhang, J.4
-
7
-
-
84871643875
-
On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input
-
Dec.
-
S. Bashar, Z. Ding, C. Xiao, "On secrecy rate analysis of MIMO wiretap channels driven by finite-alphabet input, " IEEE Trans. Commun., vol. 60, no. 12, pp. 3816-3825, Dec. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.12
, pp. 3816-3825
-
-
Bashar, S.1
Ding, Z.2
Xiao, C.3
-
8
-
-
84939522682
-
Secrecy enhancement analysis against unknown eavesdroppering in spatial modulation
-
Aug.
-
L. Wang, S. Bashar, Y. Wei, R. Li, "Secrecy enhancement analysis against unknown eavesdroppering in spatial modulation, " IEEE Commun. Lett., vol. 19, no. 8, pp. 1351-1354, Aug. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.8
, pp. 1351-1354
-
-
Wang, L.1
Bashar, S.2
Wei, Y.3
Li, R.4
-
9
-
-
84890430700
-
Secrecy-based access control for device-to-device communication underlaying cellular networks
-
Nov.
-
J. Yue, C. Ma, H. Yu, W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks, " IEEE Commun. Lett., vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.11
, pp. 2068-2071
-
-
Yue, J.1
Ma, C.2
Yu, H.3
Zhou, W.4
-
10
-
-
84930508485
-
Advances on security threats and countermeasures for cognitive radio networks: A survey
-
2nd Quart.
-
R. K. Sharma and D. B. Rawat, "Advances on security threats and countermeasures for cognitive radio networks: A survey, " IEEE Commun. Surveys Tut., vol. 17, no. 2, pp. 1023-1043, 2nd Quart. 2015.
-
(2015)
IEEE Commun. Surveys Tut.
, vol.17
, Issue.2
, pp. 1023-1043
-
-
Sharma, R.K.1
Rawat, D.B.2
-
11
-
-
84929359010
-
Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
-
May
-
Z. Chu, K. Cumanan, Z. Ding, M. Johnston, S. Y. Le Goff, "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer, " IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1833-1847, May 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.5
, pp. 1833-1847
-
-
Chu, Z.1
Cumanan, K.2
Ding, Z.3
Johnston, M.4
Le Goff, S.Y.5
-
12
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct.
-
R. Zhang, L. Song, Z. Han, B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers, " IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
13
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
3rd Quart
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey, " IEEE Commun. Surveys Tut., vol. 16, no. 3, pp. 1550-1573, 3rd Quart. 2014.
-
(2014)
IEEE Commun. Surveys Tut.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
14
-
-
84933048120
-
The challenges facing physical layer security
-
Jun.
-
W. Trappe, "The challenges facing physical layer security, " IEEE Commun. Mag., vol. 53, no. 6, pp. 16-20, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 16-20
-
-
Trappe, W.1
-
15
-
-
84942279827
-
Device-to-Device link admission policy based on social interaction information
-
Sep.
-
L. Wang, H. Tang, M. ? Cierny, "Device-to-Device link admission policy based on social interaction information, " IEEE Trans. Veh. Technol., vol. 64, no. 9, pp. 4180-4186, Sep. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.9
, pp. 4180-4186
-
-
Wang, L.1
Tang, H.2
Cierny, M.3
-
16
-
-
84893284854
-
Social network enhance device-to-device communication underlaying cellular networks
-
Aug.
-
Y. Zhang, et al., "Social network enhance device-to-device communication underlaying cellular networks, " in Proc. IEEE/CIC Int. Conf. Commun. China, Xi an, China, Aug. 2013, pp. 182-186.
-
(2013)
Proc. IEEE/CIC Int. Conf. Commun. China, Xi An, China
, pp. 182-186
-
-
Zhang, Y.1
-
17
-
-
85008538314
-
Combined relay selection and cooperative beamforming for physical layer security
-
Aug.
-
J. Kim, A. Ikhlef, R. Schober, "Combined relay selection and cooperative beamforming for physical layer security, " J. Commun. Netw., vol. 14, no. 4, pp. 364-373, Aug. 2012.
-
(2012)
J. Commun. Netw.
, vol.14
, Issue.4
, pp. 364-373
-
-
Kim, J.1
Ikhlef, A.2
Schober, R.3
-
18
-
-
84883029780
-
Social trust and social reciprocity Based Cooperative D2D Communications
-
Aug.
-
X. Chen, B. Proulx, X. Gong, J. Zhang, "Social trust and social reciprocity Based Cooperative D2D Communications, " in Proc. ACM Int. Symp. MobiHoc, Aug. 2013, pp. 187-196.
-
(2013)
Proc. ACM Int. Symp. MobiHoc
, pp. 187-196
-
-
Chen, X.1
Proulx, B.2
Gong, X.3
Zhang, J.4
-
19
-
-
84964840343
-
Secrecy-oriented resource sharing for cellular device-to-device underlay
-
Dec.
-
L. Wang, H. Wu, M. Peng, M. Song, G. L. Stüber, "Secrecy-oriented resource sharing for cellular device-to-device underlay, " in Proc. IEEE GLOBECOM, San Diego, CA, USA, Dec. 2015, pp. 1-5.
-
(2015)
Proc. IEEE GLOBECOM, San Diego, CA, USA
, pp. 1-5
-
-
Wang, L.1
Wu, H.2
Peng, M.3
Song, M.4
Stüber, G.L.5
-
21
-
-
77649274105
-
Distributed relay-assignment protocols for coverage expansion in cooperative wireless networks
-
Apr.
-
A. K. Sadek, Z. Han, K. J. R. Liu, "Distributed relay-assignment protocols for coverage expansion in cooperative wireless networks, " IEEE Trans. Mobile Comput., vol. 9, no. 4, pp. 505-515, Apr. 2010.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, Issue.4
, pp. 505-515
-
-
Sadek, A.K.1
Han, Z.2
Liu, K.J.R.3
-
22
-
-
0038444540
-
Optimal transmitter eigen-beamforming and space-time block coding based on channel correlations
-
Jul.
-
S. Zhou and G. B. Giannakis, "Optimal transmitter eigen-beamforming and space-time block coding based on channel correlations, " IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1673-1690, Jul. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.7
, pp. 1673-1690
-
-
Zhou, S.1
Giannakis, G.B.2
-
24
-
-
84944189169
-
Socially enabled wireless networks: Resource allocation via bipartite graph matching
-
Oct.
-
L. Wang, H. Wu, W. Wang, K. C. Chen, "Socially enabled wireless networks: Resource allocation via bipartite graph matching, " IEEE Commun. Mag., vol. 53, no. 10, pp. 128-135, Oct. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.10
, pp. 128-135
-
-
Wang, L.1
Wu, H.2
Wang, W.3
Chen, K.C.4
-
25
-
-
84949642579
-
Jamming partner selection for maximising the worst D2D secrecy rate based on social trust
-
L. Wang and H. Wu, "Jamming partner selection for maximising the worst D2D secrecy rate based on social trust, " Trans. Emerging Telecommun. Technol. [Online]. Available: 10. 1002/ett. 2992
-
Trans. Emerging Telecommun. Technol
-
-
Wang, L.1
Wu, H.2
-
26
-
-
84972487889
-
Simulated annealing
-
D. Bertsimas and J. Tsitsiklis, "Simulated annealing, " Statist. Sci., vol. 8, no. 1, pp. 10-15, 1993.
-
(1993)
Statist. Sci.
, vol.8
, Issue.1
, pp. 10-15
-
-
Bertsimas, D.1
Tsitsiklis, J.2
-
27
-
-
0028442650
-
Simulated annealing: A proof of convergence
-
Jun.
-
V. Granville, M. K?rivánek, J.-P. Rasson, "Simulated annealing: A proof of convergence, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 6, pp. 652-656, Jun. 1994.
-
(1994)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.16
, Issue.6
, pp. 652-656
-
-
Granville, V.1
Krivánek, M.2
Rasson, J.-P.3
-
28
-
-
84953723092
-
Energy-efficient resource allocation for D2D communications in cellular networks
-
doi: TVT.2015.2482388, Sep.
-
T. D. Hoang, L. B. Le, T. Le-Ngoc, "Energy-efficient resource allocation for D2D communications in cellular networks, " IEEE Trans. Veh. Technol., doi: TVT. 2015. 2482388, Sep. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
-
-
Hoang, T.D.1
Le, L.B.2
Le-Ngoc, T.3
-
29
-
-
84355161968
-
Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks
-
Dec.
-
H. Min, J. Lee, S. Park, D. Hong, "Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks, " IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 3995-4000, Dec. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.12
, pp. 3995-4000
-
-
Min, H.1
Lee, J.2
Park, S.3
Hong, D.4
-
31
-
-
0001204054
-
A new algorithm for generalized fractional programs
-
Feb.
-
A. I. Barros, J. B. G. Frenk, S. Schaible, S. Zhang, "A new algorithm for generalized fractional programs, " Math. Program., vol. 72, no. 2, pp. 147-175, Feb. 1996.
-
(1996)
Math. Program.
, vol.72
, Issue.2
, pp. 147-175
-
-
Barros, A.I.1
Frenk, J.B.G.2
Schaible, S.3
Zhang, S.4
-
32
-
-
33750045684
-
Extensions of Dinkelbach's algorithm for solving nonlinear fractional programming problems
-
Jun.
-
R. G. Ródenas, M. L. López, D. Verastegui, "Extensions of Dinkelbach's algorithm for solving nonlinear fractional programming problems, " Top, vol. 7, no. 1, pp. 33-70, Jun. 1999.
-
(1999)
Top
, vol.7
, Issue.1
, pp. 33-70
-
-
Ródenas, R.G.1
López, M.L.2
Verastegui, D.3
-
33
-
-
0032593386
-
Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques
-
Jul.
-
M.-S. Alouini and A. J. Goldsmith, "Capacity of Rayleigh fading channels under different adaptive transmission and diversity-combining techniques, " IEEE Trans. Veh. Technol., vol. 48, no. 4, pp. 1165-1181, Jul. 1999.
-
(1999)
IEEE Trans. Veh. Technol.
, vol.48
, Issue.4
, pp. 1165-1181
-
-
Alouini, M.-S.1
Goldsmith, A.J.2
-
34
-
-
0014535847
-
A table of integrals of the exponential integral
-
Jul.-Sep.
-
M. Geller and E. W. Ng, "A table of integrals of the exponential integral, " J. Res. Nat. Bureau Standards B, Math. Math. Sci., vol. 73B, no. 3, pp. 191-210, Jul.-Sep. 1969.
-
(1969)
J. Res. Nat. Bureau Standards B, Math. Math. Sci.
, vol.73 B
, Issue.3
, pp. 191-210
-
-
Geller, M.1
Ng, E.W.2
-
35
-
-
84883385828
-
Privacy-preserving profile matching for proximity-based mobile social networking
-
Sep.
-
R. Zhang, J. Zhang, Y. Zhang, J. Sun, G. Yan, "Privacy-preserving profile matching for proximity-based mobile social networking, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 656-668, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 656-668
-
-
Zhang, R.1
Zhang, J.2
Zhang, Y.3
Sun, J.4
Yan, G.5
-
36
-
-
84866513570
-
Morality-driven data forwarding with privacy preservation in mobile social networks
-
Sep.
-
X. Liang, et al., "Morality-driven data forwarding with privacy preservation in mobile social networks, " IEEE Trans. Veh. Technol., vol. 61, no. 7, pp. 3209-3222, Sep. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.7
, pp. 3209-3222
-
-
Liang, X.1
|