-
1
-
-
67349259569
-
Breaking spectrum gridlock with cognative radios: An information theoretic perspective
-
May
-
A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognative radios: An information theoretic perspective, " Proc. IEEE, vol. 97, no. 5, pp. 894-914, May 2009.
-
(2009)
Proc. IEEE
, vol.97
, Issue.5
, pp. 894-914
-
-
Goldsmith, A.1
Jafar, S.A.2
Maric, I.3
Srinivasa, S.4
-
2
-
-
84897497570
-
Antenna selection with power adaptation in interference-constrained cognitive radios
-
Feb.
-
R. Sarvendranath and N. B. Mehta, "Antenna selection with power adaptation in interference-constrained cognitive radios, " IEEE Trans. Commun., vol. 62, no. 3, pp. 786-796, Feb. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.3
, pp. 786-796
-
-
Sarvendranath, R.1
Mehta, N.B.2
-
3
-
-
83555163951
-
MIMO cognitive radios with antenna selection
-
Sep.
-
M. F. Hanif, P. J. Smith, D. P. Taylor, and P. A. Martin, "MIMO cognitive radios with antenna selection, " IEEE Trans. Wireless Commun., vol. 10, no. 11, pp. 3688-3699, Sep. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.11
, pp. 3688-3699
-
-
Hanif, M.F.1
Smith, P.J.2
Taylor, D.P.3
Martin, P.A.4
-
4
-
-
84874947832
-
Antenna selection in interference constrained underlay cognitive radios: Sep-optimal rule and performance benchmarking
-
Feb.
-
R. Sarvendranath and N. B. Mehta, "Antenna selection in interference constrained underlay cognitive radios: Sep-optimal rule and performance benchmarking, " IEEE Trans. Commun., vol. 61, no. 2, pp. 496-506, Feb. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.2
, pp. 496-506
-
-
Sarvendranath, R.1
Mehta, N.B.2
-
5
-
-
54849430727
-
Identitybased key management in mobile ad hoc networks: Techniques and applications
-
Oct.
-
E. D. Silva, A. L. D. Santos, L. C. P. Albini, and M. Lima, "Identitybased key management in mobile ad hoc networks: Techniques and applications, " IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 46-52, Oct. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.5
, pp. 46-52
-
-
Silva, E.D.1
Santos, A.L.D.2
Albini, L.C.P.3
Lima, M.4
-
6
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
7
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
8
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels, " IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
9
-
-
40949147785
-
Multiple-access channels with confidential messages
-
Mar.
-
Y. Liang and H. V. Poor, "Multiple-access channels with confidential messages, " IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 976-1002, Mar. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.3
, pp. 976-1002
-
-
Liang, Y.1
Poor, H.V.2
-
10
-
-
45249104852
-
Secrecy capacities for multiterminal channel models
-
Jun.
-
I. Csiszr and P. Narayan, "Secrecy capacities for multiterminal channel models, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2437-2452, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2437-2452
-
-
Csiszr, I.1
Narayan, P.2
-
11
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G.W. Wornell, "Secure broadcasting over fading channels, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
12
-
-
84863913546
-
Physical-layer secrecy for OFDM transmissions over fading channels
-
Aug.
-
F. Renna, N. Laurenti, and H. Poor, "Physical-layer secrecy for OFDM transmissions over fading channels, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1354-1367
-
-
Renna, F.1
Laurenti, N.2
Poor, H.3
-
13
-
-
64549128283
-
Secure wireless communications via cooperation
-
Urbana-Champaign, IL, USA, Sep.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Secure wireless communications via cooperation, " in Proc. 46th Annu. Allerton Conf. Commun., Control, Comput., Urbana-Champaign, IL, USA, Sep. 2008, pp. 1132-1138.
-
(2008)
Proc. 46th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 1132-1138
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
14
-
-
70349218031
-
Amplify-and-forward based cooperation for secure wireless communications
-
Apr.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Amplify-and-forward based cooperation for secure wireless communications, " in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Taipei, Taiwan, Apr. 2009, pp. 2613-2616.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Taipei, Taiwan
, pp. 2613-2616
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
15
-
-
48049102969
-
The Gaussian multiple access wire-tap channel:wireless secrecy and cooperative jamming
-
Feb.
-
E. Tekin, "The Gaussian multiple access wire-tap channel:wireless secrecy and cooperative jamming, " in Proc. Inf. Theory Appl. Workshop, La Jolla, CA, USA, Feb. 2007, pp. 404-413.
-
(2007)
Proc. Inf. Theory Appl. Workshop, la Jolla, CA, USA
, pp. 404-413
-
-
Tekin, E.1
-
16
-
-
45249101530
-
The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
17
-
-
84870499401
-
A general relaying transmission protocol for MIMO secrecy communications
-
Nov.
-
Z. Ding, M. Peng, and H. H. Chen, "A general relaying transmission protocol for MIMO secrecy communications, " IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.H.3
-
18
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming, " IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
19
-
-
84862859556
-
Comment on 'Relay selection for secure cooperative networks with jamming
-
Jun.
-
G. Chen et al., "Comment on 'Relay selection for secure cooperative networks with jamming, '" IEEE Trans. Wireless Commun., vol. 11, no. 6, pp. 2351-2351, Jun. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.6
, pp. 2351
-
-
Chen, G.1
-
20
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. C. Chen, R. Q. Zhang, L. Y. Song, Z. Han, and B. L. Jiao, "Joint relay and jammer selection for secure two-way relay networks, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.C.1
Zhang, R.Q.2
Song, L.Y.3
Han, Z.4
Jiao, B.L.5
-
21
-
-
84896908427
-
Max-ratio relay selection in secure buffer-aided cooperative wireless networks
-
Apr.
-
G. Chen, Z. Tian, Y. Gong, Z. Chen, and J. A. Chambers, "Max-ratio relay selection in secure buffer-aided cooperative wireless networks, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 719-729, Apr. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.4
, pp. 719-729
-
-
Chen, G.1
Tian, Z.2
Gong, Y.3
Chen, Z.4
Chambers, J.A.5
-
22
-
-
84863127299
-
Impact of interference on secrecy capacity in a cognitive radio network
-
Apr.
-
Z. Shu, Y. Yang, Y. Qian, and R. Hu, "Impact of interference on secrecy capacity in a cognitive radio network, " in Proc. IEEE GLOBECOM, Houston, TX, USA, Apr. 2011, pp. 1-6.
-
(2011)
Proc. IEEE GLOBECOM, Houston, TX, USA
, pp. 1-6
-
-
Shu, Z.1
Yang, Y.2
Qian, Y.3
Hu, R.4
-
23
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec.
-
Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks, " IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
24
-
-
80051757604
-
An information secrecy game in cognitive ratio networks
-
Sep.
-
Y. Wu and K. Liu, "An information secrecy game in cognitive ratio networks, " IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 831-842
-
-
Wu, Y.1
Liu, K.2
-
25
-
-
84896328783
-
Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for peimary users
-
Feb.
-
N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, "Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for peimary users, " IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 1058-1073, Feb. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.2
, pp. 1058-1073
-
-
Mokari, N.1
Parsaeefard, S.2
Saeedi, H.3
Azmi, P.4
-
26
-
-
84907875274
-
Analog/RF solutions enabling compact full-duplex radios
-
Jun.
-
B. Debaillie et al., "Analog/RF solutions enabling compact full-duplex radios, " IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1622-1673, Jun. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.9
, pp. 1622-1673
-
-
Debaillie, B.1
-
27
-
-
84896850363
-
Aplications of self-interference cancellation in 5G and beyond
-
Feb.
-
S. Hong et al., "Aplications of self-interference cancellation in 5G and beyond, " IEEE Commun. Mag., vol. 52, no. 2, pp. 114-121, Feb. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.2
, pp. 114-121
-
-
Hong, S.1
-
28
-
-
84891596482
-
Full duplex radios
-
Aug.
-
D. Bharadia, E. McMilin, and S. Katti, "Full duplex radios, " in Proc. ACM SIGCOMM, Hong Kong, Aug. 2013, pp. 375-386.
-
(2013)
Proc. ACM SIGCOMM, Hong Kong
, pp. 375-386
-
-
Bharadia, D.1
McMilin, E.2
Katti, S.3
-
29
-
-
33847696923
-
Fundamental limits of spectrum-sharing in fading environments
-
Feb.
-
A. Ghasemi and E. S. Sousa, "Fundamental limits of spectrum-sharing in fading environments, " IEEE Trans. Commun., vol. 6, no. 2, pp. 649-658, Feb. 2007.
-
(2007)
IEEE Trans. Commun.
, vol.6
, Issue.2
, pp. 649-658
-
-
Ghasemi, A.1
Sousa, E.S.2
-
30
-
-
14244266054
-
Approaches to spectrum sharing
-
Feb.
-
J. M. Peha, "Approaches to spectrum sharing, " IEEE Commun. Mag., vol. 43, no. 2, pp. 10-12, Feb. 2005.
-
(2005)
IEEE Commun. Mag.
, vol.43
, Issue.2
, pp. 10-12
-
-
Peha, J.M.1
-
31
-
-
2442424060
-
Antenna isolation, wideband multipath propagation measurements and interference mitigation for on-frequency repeaters
-
Mar.
-
C. R. Anderson et al., "Antenna isolation, wideband multipath propagation measurements and interference mitigation for on-frequency repeaters, " in Proc. IEEE SoutheastCon, Mar. 2004, pp. 110-114.
-
(2004)
Proc. IEEE Southeast Con
, pp. 110-114
-
-
Anderson, C.R.1
-
32
-
-
73149095192
-
Improving efficiency of resource usage in two-hop full duplex relay systems based on resource sharing and interference cancellation
-
Aug.
-
H. Ju, E. Oh, and D. Hong, "Improving efficiency of resource usage in two-hop full duplex relay systems based on resource sharing and interference cancellation, " IEEE Trans. Wireless Commun., vol. 8, no. 8, pp. 3933-3938, Aug. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.8
, pp. 3933-3938
-
-
Ju, H.1
Oh, E.2
Hong, D.3
-
33
-
-
85027437737
-
Study of relay selection in a multi-cell cognitive network
-
Jun.
-
G. Chen, Y. Gong, and J. A. Chambers, "Study of relay selection in a multi-cell cognitive network, " IEEE Wireless Commun. Lett., vol. 11, no. 6, pp. 2351-2354, Jun. 2012.
-
(2012)
IEEE Wireless Commun. Lett.
, vol.11
, Issue.6
, pp. 2351-2354
-
-
Chen, G.1
Gong, Y.2
Chambers, J.A.3
|