-
1
-
-
84937114750
-
On the spectral efficiency of multiuser scheduling in RF-powered uplink cellular networks
-
Jul.
-
H. Tabassum, E. Hossain, M. J. Hossain, and D. I. Kim, " On the spectral efficiency of multiuser scheduling in RF-powered uplink cellular networks," IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3586-3600, Jul. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.7
, pp. 3586-3600
-
-
Tabassum, H.1
Hossain, E.2
Hossain, M.J.3
Kim, D.I.4
-
2
-
-
84945389946
-
User scheduling for MU-MIMO transmission with active CSI feedback
-
Apr.
-
K.-H. Lee and C.-K. Kim, " User scheduling for MU-MIMO transmission with active CSI feedback," Eurasip J. Wireless Commun. Netw., vol. 2015, Apr. 2015, Art. no. 112.
-
(2015)
Eurasip J. Wireless Commun. Netw.
, vol.2015
-
-
Lee, K.-H.1
Kim, C.-K.2
-
3
-
-
84938892321
-
Power control and group proportional fairness for frequency domain resource allocation in L-SC-FDMA based LTE uplink
-
Aug.
-
I. Ahmed and A. Mohamed, " Power control and group proportional fairness for frequency domain resource allocation in L-SC-FDMA based LTE uplink," Wireless Netw., vol. 21, no. 6, pp. 1819-1834, Aug. 2015.
-
(2015)
Wireless Netw.
, vol.21
, Issue.6
, pp. 1819-1834
-
-
Ahmed, I.1
Mohamed, A.2
-
4
-
-
84939479293
-
Robust rate adaptation and proportional fair scheduling with imperfect CSI
-
Aug.
-
R. Fritzsche, P. Rost, and G. P. Fettweis, " Robust rate adaptation and proportional fair scheduling with imperfect CSI," IEEE Trans. Wireless Commun., vol. 14, no. 8, pp. 4417-4427, Aug. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.8
, pp. 4417-4427
-
-
Fritzsche, R.1
Rost, P.2
Fettweis, G.P.3
-
5
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S.W. McLaughlin, " Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
6
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, " The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
7
-
-
84979824607
-
A survey on wireless security: Technical challenges, recent advances, and future trends
-
Sep.
-
Y. Zou, J. Zhu, X. Wang, and L. Hanzo, " A survey on wireless security: Technical challenges, recent advances, and future trends," Proc. IEEE, vol. 104, no. 9, pp. 1727-1765, Sep. 2016.
-
(2016)
Proc. IEEE
, vol.104
, Issue.9
, pp. 1727-1765
-
-
Zou, Y.1
Zhu, J.2
Wang, X.3
Hanzo, L.4
-
8
-
-
84939457021
-
Secure transmission in MIMO wiretap channels using general-order transmit antenna selection with outdated CSI
-
Aug.
-
Y. Huang, F. S. Al-Qahtani, T. Q. Duong, and J. Wang, " Secure transmission in MIMO wiretap channels using general-order transmit antenna selection with outdated CSI," IEEE Trans. Commun., vol. 63, no. 8, pp. 2959-2971, Aug. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.8
, pp. 2959-2971
-
-
Huang, Y.1
Al-Qahtani, F.S.2
Duong, T.Q.3
Wang, J.4
-
9
-
-
84963812047
-
Improving physical-layer security for CRNs using SINR-based cooperative beamforming
-
Mar.
-
F. Zhu and M. Yao, " Improving physical-layer security for CRNs using SINR-based cooperative beamforming," IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1835-1841, Mar. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.3
, pp. 1835-1841
-
-
Zhu, F.1
Yao, M.2
-
10
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, " Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
11
-
-
84894146535
-
Tradeoff between reliability and security in multiple access relay networks under falsified data injection attack
-
Mar.
-
T. A. Khalaf, S. Kim, and A. E. Abdel-Hakim, " Tradeoff between reliability and security in multiple access relay networks under falsified data injection attack," IEEE Trans. Inf. Forensics Security, vol. 9, no. 3, pp. 386-396, Mar. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.3
, pp. 386-396
-
-
Khalaf, T.A.1
Kim, S.2
Abdel-Hakim, A.E.3
-
12
-
-
84899494358
-
Security-reliability performance of cognitive AF relay-based wireless communication system with channel estimation error
-
Mar.
-
Q. Gu, G. Wang, L. Gao, and M. Peng, " Security-reliability performance of cognitive AF relay-based wireless communication system with channel estimation error," EURASIP J. Adv. Signal Process., vol. 2014, Mar. 2014, Art. no. 28.
-
(2014)
EURASIP J. Adv. Signal Process.
, vol.2014
-
-
Gu, Q.1
Wang, G.2
Gao, L.3
Peng, M.4
-
13
-
-
84921348505
-
Relay-selection improves the security-reliability trade-off in cognitive radio systems
-
Jan.
-
Y. Zou, B. Champagne, W.-P. Zhu, and L. Hanzo, " Relay-selection improves the security-reliability trade-off in cognitive radio systems," IEEE Trans. Commun., vol. 63, no. 1, pp. 215-228, Jan. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.1
, pp. 215-228
-
-
Zou, Y.1
Champagne, B.2
Zhu, W.-P.3
Hanzo, L.4
-
14
-
-
45249101530
-
The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, " The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
15
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevi¢, and H. V. Poor, " Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevi, P.3
Poor, H.V.4
-
16
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, " Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
17
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
Oct.
-
S. Fakoorian and A. Swindlehurst, " Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.1
Swindlehurst, A.2
-
18
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs. Relay chatting
-
Jun.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, " Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 16, pp. 1725-1729, Jun. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.16
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
19
-
-
84883300441
-
Effect of feedback delay on secure cooperative networks with joint relay and jammer selection
-
Aug.
-
N.-E. Wu and H.-J. Li, " Effect of feedback delay on secure cooperative networks with joint relay and jammer selection," IEEE Wireless Commun. Lett., vol. 2, no. 4, pp. 415-418, Aug. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.4
, pp. 415-418
-
-
Wu, N.-E.1
Li, H.-J.2
-
20
-
-
84957100456
-
Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems
-
Oct.
-
H.-M. Wang, F. Liu, and M. Yang, " Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems," IEEE Trans. Veh. Technol., vol. 64, no. 10, pp. 4893-4898, Oct. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.10
, pp. 4893-4898
-
-
Wang, H.-M.1
Liu, F.2
Yang, M.3
-
21
-
-
79951614632
-
Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels
-
Oct./Nov.
-
A. Mukherjee and A. L. Swindlehurst, " Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels," in Proc. Military Commun. Conf. (MILCOM), Oct./Nov. 2010, pp. 1695-1700.
-
(2010)
Proc. Military Commun. Conf. (MILCOM)
, pp. 1695-1700
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
22
-
-
84856969548
-
Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
-
Nov.
-
A. Q. Zhu, W. Saad, Z. Han, H. V. Poor, and T. Baar, " Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach," in Proc. Military Commun. Conf. (MILCOM), Nov. 2011, pp. 119-124.
-
(2011)
Proc. Military Commun. Conf. (MILCOM)
, pp. 119-124
-
-
Zhu, A.Q.1
Saad, W.2
Han, Z.3
Poor, H.V.4
Baar, T.5
-
23
-
-
84963623717
-
A game theoretic analysis of secret and reliable communication with active and passive adversarial modes
-
Mar.
-
A. Garnaev, M. Baykal-Gursoy, and H. V. Poor, " A game theoretic analysis of secret and reliable communication with active and passive adversarial modes," IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2155-2163, Mar. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.3
, pp. 2155-2163
-
-
Garnaev, A.1
Baykal-Gursoy, M.2
Poor, H.V.3
-
24
-
-
84927643338
-
Secret communication when the eavesdropper might be an active adversary
-
Springer
-
A. Garnaev, W. Trappe, M. Jonsson, A. Vinel, B. Bellalta, and E. Belyaev, " Secret communication when the eavesdropper might be an active adversary," in Multiple Access Communications. Springer, 2014, pp. 121-136.
-
(2014)
Multiple Access Communications
, pp. 121-136
-
-
Garnaev, A.1
Trappe, W.2
Jonsson, M.3
Vinel, A.4
Bellalta, B.5
Belyaev, E.6
-
25
-
-
84959251264
-
Secrecy outage probability of optimal relay selection for secure AnF cooperative networks
-
Dec.
-
B. V. Nguyen and K. Kim, " Secrecy outage probability of optimal relay selection for secure AnF cooperative networks," IEEE Commun. Lett., vol. 19, no. 12, pp. 2086-2089, Dec. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.12
, pp. 2086-2089
-
-
Nguyen, B.V.1
Kim, K.2
-
26
-
-
84940644968
-
A mathematical theory of communication
-
Oct.
-
C. E. Shannon, " A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, no. 3, pp. 379-423, Oct. 1948.
-
(1948)
Bell Syst. Tech. J.
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.E.1
-
27
-
-
77955682277
-
An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks
-
Oct.
-
Y. Zou, J. Zhu, B. Zheng, and Y.-D. Yao, " An adaptive cooperation diversity scheme with best-relay selection in cognitive radio networks," IEEE Trans. Signal Process., vol. 58, no. 10, pp. 5438-5445, Oct. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.10
, pp. 5438-5445
-
-
Zou, Y.1
Zhu, J.2
Zheng, B.3
Yao, Y.-D.4
-
28
-
-
0003498504
-
-
San Diego, CA, USA: Academic
-
I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, and D. Zwillinger, Table of Integrals, Series, and Products, 7th ed. San Diego, CA, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, and Products, 7th Ed.
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
Jeffrey, A.3
Zwillinger, D.4
-
29
-
-
33646065945
-
Capacity and power allocation for fading MIMO channels with channel estimation error
-
May
-
T. Yoo and A. Goldsmith, " Capacity and power allocation for fading MIMO channels with channel estimation error," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2203-2214, May 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2203-2214
-
-
Yoo, T.1
Goldsmith, A.2
-
30
-
-
84919667792
-
Secrecy outage and diversity analysis of cognitive radio systems
-
Nov.
-
Y. Zou, X. Li, and Y.-C. Liang, " Secrecy outage and diversity analysis of cognitive radio systems," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2222-2236, Nov. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.11
, pp. 2222-2236
-
-
Zou, Y.1
Li, X.2
Liang, Y.-C.3
-
31
-
-
0042807887
-
A property of the normal distribution
-
E. Lukacs and E. P. King, " A property of the normal distribution," Ann. Math. Statist., vol. 25, no. 2, pp. 389-394, 1954.
-
(1954)
Ann. Math. Statist.
, vol.25
, Issue.2
, pp. 389-394
-
-
Lukacs, E.1
King, E.P.2
|