-
1
-
-
34548074211
-
Improving amplify-and-forward relay networks: Optimal power allocation versus selection
-
Aug.
-
Y. Zhao, R. Adve, and T. J. Lim, "Improving amplify-and-forward relay networks: Optimal power allocation versus selection," IEEE Trans. Wireless Commun., vol. 6, no. 8, pp. 3114-3123, Aug. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.8
, pp. 3114-3123
-
-
Zhao, Y.1
Adve, R.2
Lim, T.J.3
-
2
-
-
84939459175
-
The maximum-SNR optimal weighting matrix for a class of amplify-and-forward MIMO relaying assisted orthogonal space time block coded transmission
-
Aug.
-
W. Liu and J. D. Li, "The maximum-SNR optimal weighting matrix for a class of amplify-and-forward MIMO relaying assisted orthogonal space time block coded transmission," IEEE Trans. Commun., vol. 63, no. 8, pp. 2864-2872, Aug. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.8
, pp. 2864-2872
-
-
Liu, W.1
Li, J.D.2
-
3
-
-
34247619637
-
Highperformance cooperative demodulation with decode-and-forward relays
-
Jul.
-
T. R. Wang, A. Cano, G. B. Giannakis, and J. N. Laneman, "Highperformance cooperative demodulation with decode-and-forward relays," IEEE Trans. Commun., vol. 55, no. 7, pp. 1427-1438, Jul. 2007.
-
(2007)
IEEE Trans. Commun.
, vol.55
, Issue.7
, pp. 1427-1438
-
-
Wang, T.R.1
Cano, A.2
Giannakis, G.B.3
Laneman, J.N.4
-
4
-
-
84929329308
-
SEP of decode-and-forward cooperative systemswith relay selection inNakagami-m fading channels
-
May
-
G.K.Young andN. C. Beaulieu, "SEP of decode-and-forward cooperative systemswith relay selection inNakagami-m fading channels," IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1882-1894, May 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.5
, pp. 1882-1894
-
-
Young, G.K.1
Beaulieu, N.C.2
-
5
-
-
5044252003
-
Cooperative diversity in wireless networks: Efficient protocols and outage behaviour
-
Dec.
-
J. N. Laneman, D. N. C. Tse, and G.W.Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behaviour," IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.12
, pp. 3062-3080
-
-
Laneman, J.N.1
Tse, D.N.C.2
Wornell, G.W.3
-
6
-
-
84864591801
-
Dispensing with channel estimation: Differentially modulated cooperative wireless communications
-
Mar.
-
L. Wang and L. Hanzo, "Dispensing with channel estimation: Differentially modulated cooperative wireless communications," IEEE Commun. Surveys Tut., vol. 14, no. 3, pp. 836-857, Mar. 2012.
-
(2012)
IEEE Commun. Surveys Tut.
, vol.14
, Issue.3
, pp. 836-857
-
-
Wang, L.1
Hanzo, L.2
-
7
-
-
33947678080
-
Performance of amplify-and-forward and decode-and-forward relaying in Rayleigh fading with turbo codes
-
May
-
M. Souryal and B. Vojcic, "Performance of amplify-and-forward and decode-and-forward relaying in Rayleigh fading with turbo codes," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., May 2006, pp. 681-684.
-
(2006)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 681-684
-
-
Souryal, M.1
Vojcic, B.2
-
8
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
9
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
10
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
12
-
-
45249101530
-
The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
13
-
-
84907091824
-
Cooperative jamming and power allocation with untrusty two-way relay nodes
-
Sep.
-
H. Long, W. Xiang, J. Wang, Y. Y. Zhang, and W. B. Wang, "Cooperative jamming and power allocation with untrusty two-way relay nodes," IET Commun., vol. 8, no. 13, pp. 2290-2297, Sep. 2014.
-
(2014)
IET Commun.
, vol.8
, Issue.13
, pp. 2290-2297
-
-
Long, H.1
Xiang, W.2
Wang, J.3
Zhang, Y.Y.4
Wang, W.B.5
-
14
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
15
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I. Kim, and K. Dong, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.2
Dong, K.3
-
16
-
-
84899906448
-
Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise
-
Apr.
-
Z. Ding, M. Zheng, and P. Fan, "Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise," IEEE Trans.Wireless Commun., vol. 13, no. 4, pp. 2189-2203, Apr. 2014.
-
(2014)
IEEE Trans.Wireless Commun.
, vol.13
, Issue.4
, pp. 2189-2203
-
-
Ding, Z.1
Zheng, M.2
Fan, P.3
-
17
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs. Relay chatting
-
Jun.
-
Z. Ding, K. Leung, D. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, Jun. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.2
Goeckel, D.3
Towsley, D.4
-
18
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
19
-
-
84883300441
-
Effect of feedback delay on secure cooperative networks with joint relay and jammer selection
-
Aug.
-
N. E. Zou and H. J. Li, "Effect of feedback delay on secure cooperative networks with joint relay and jammer selection," IEEE Wireless Commun. Lett., vol. 2, no. 4, pp. 415-418, Aug. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.4
, pp. 415-418
-
-
Zou, N.E.1
Li, H.J.2
-
20
-
-
84957100456
-
Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems
-
Oct.
-
H. M. Wang, F. Liu, and M. C. Yang, "Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems," IEEE Trans. Veh. Technol., vol. 64, no. 10, pp. 4893-4898, Oct. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.10
, pp. 4893-4898
-
-
Wang, H.M.1
Liu, F.2
Yang, M.C.3
-
21
-
-
84946240351
-
Robust joint beamforming and jamming for secure AF networks: Low-complexity design
-
May
-
C Wang and H. M. Wang, "Robust joint beamforming and jamming for secure AF networks: Low-complexity design," IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.5
, pp. 2192-2198
-
-
Wang, C.1
Wang, H.M.2
-
22
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H. M. Wang, and X. G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.M.2
Xia, X.G.3
-
23
-
-
84884537599
-
Optimal relay selection for physical-layer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X.Wang, andW. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
24
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
25
-
-
84898039745
-
Secure beamforming for MIMO two-way communications with an untrusted relay
-
May
-
J. H. Mo, M. X. Tao, Y. Liu, and R. Wang, "Secure beamforming for MIMO two-way communications with an untrusted relay," IEEE Trans. Signal Process., vol. 62, no. 9, pp. 2185-2199, May 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.9
, pp. 2185-2199
-
-
Mo, J.H.1
Tao, M.X.2
Liu, Y.3
Wang, R.4
-
26
-
-
84863956395
-
Improving wireless security for bidirectional communication scenarios
-
Jul.
-
Z. Ding, M. Xu, J. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2842-2848
-
-
Ding, Z.1
Xu, M.2
Lu, J.3
Liu, F.4
-
27
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. C. Chen, R. Q. Zhang, L. Y. Song, Z. Han, and B. L. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.C.1
Zhang, R.Q.2
Song, L.Y.3
Han, Z.4
Jiao, B.L.5
-
28
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H. M. Wang, M. Luo, Q. Yin, and X. G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.M.1
Luo, M.2
Yin, Q.3
Xia, X.G.4
-
29
-
-
84921773816
-
Secure relay and jammer selection for physical layer security
-
Aug.
-
H. Hui, A. Lee, G. Li, and J. Liang, "Secure relay and jammer selection for physical layer security," IEEE Signal Process. Lett., vol. 22, no. 8, pp. 1147-1151, Aug. 2015.
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.8
, pp. 1147-1151
-
-
Hui, H.1
Lee, A.2
Li, G.3
Liang, J.4
-
30
-
-
84923581161
-
Relay and jammer selection schemes for improving physical layer security in two-way cooperative networks
-
May
-
D. Ibrahim, E. Hassan, and S. EI-Dolil, "Relay and jammer selection schemes for improving physical layer security in two-way cooperative networks," Comput. Security, vol. 50, pp. 47-59, May 2015.
-
(2015)
Comput. Security
, vol.50
, pp. 47-59
-
-
Ibrahim, D.1
Hassan, E.2
EI-Dolil, S.3
-
31
-
-
84904638776
-
Exat outage proability of two-way decodeand-forward scheme with opportunistic relay selection under physical layer security
-
Mar.
-
P. N. Son and H. Y. Kong, "Exat outage proability of two-way decodeand-forward scheme with opportunistic relay selection under physical layer security," Wireless Pers. Commun., vol. 77, no. 4, pp. 2889-2917, Mar. 2014.
-
(2014)
Wireless Pers. Commun.
, vol.77
, Issue.4
, pp. 2889-2917
-
-
Son, P.N.1
Kong, H.Y.2
-
32
-
-
84860400548
-
Channel estimation and training design for two-way relay networks in time-selective fading environment
-
Aug.
-
G. Wang, F. Gao, W. Chen, and C. Tellambura, "Channel estimation and training design for two-way relay networks in time-selective fading environment," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2681-2691, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2681-2691
-
-
Wang, G.1
Gao, F.2
Chen, W.3
Tellambura, C.4
-
33
-
-
84940644968
-
A mathematical theory of communication
-
Oct.
-
C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423, Oct. 1948.
-
(1948)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
34
-
-
77955682277
-
An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks
-
Oct.
-
Y. Zou, Y. D. Yao, and B. Zheng, "An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks," IEEE Trans. Signal Process., vol. 58, no. 10, pp. 5438-5445, Oct. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.10
, pp. 5438-5445
-
-
Zou, Y.1
Yao, Y.D.2
Zheng, B.3
|