-
1
-
-
84883785476
-
Improving physical layer secrecy using full-duplex jamming receivers
-
Oct.
-
G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers, " IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962-4974, Oct. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.20
, pp. 4962-4974
-
-
Zheng, G.1
Krikidis, I.2
Li, J.3
Petropulu, A.P.4
Ottersten, B.5
-
2
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective, " IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
3
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
Oct.
-
L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes, " IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, H.4
-
4
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels, " IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
5
-
-
84937132656
-
Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays
-
Jul.
-
J.-B. Kim, J. Lim, and J. M. Cioffi, "Capacity scaling and diversity order for secure cooperative relaying with untrustworthy relays, " IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3866-3876, Jul. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.7
, pp. 3866-3876
-
-
Kim, J.-B.1
Lim, J.2
Cioffi, J.M.3
-
6
-
-
84968919997
-
Near-optimal moduloand-forward scheme for the untrusted relay channel
-
May
-
S. Zhang, L. Fan, M. Peng, and H. V. Poor, "Near-optimal moduloand-forward scheme for the untrusted relay channel, " IEEE Trans. Inf. Theory, vol. 62, no. 5, pp. 2545-2556, May 2016.
-
(2016)
IEEE Trans. Inf. Theory
, vol.62
, Issue.5
, pp. 2545-2556
-
-
Zhang, S.1
Fan, L.2
Peng, M.3
Poor, H.V.4
-
7
-
-
84903317482
-
Secure transmission with optimal power allocation in untrusted relay networks
-
Jun.
-
L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure transmission with optimal power allocation in untrusted relay networks, " IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
-
(2014)
IEEE Wireless Commun. Lett.
, vol.3
, Issue.3
, pp. 289-292
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
Tran, N.H.4
Duong, T.Q.5
-
8
-
-
85042553090
-
Enhancing physicallayer security via big-data-aided hybrid relay selection
-
Mar.
-
H. He, P. Ren, Q. Du, L. Sun, and Y. Wang, "Enhancing physicallayer security via big-data-aided hybrid relay selection, " J. Commun. Inf. Netw., vol. 2, no. 1, pp. 97-110, Mar. 2017.
-
(2017)
J. Commun. Inf. Netw.
, vol.2
, Issue.1
, pp. 97-110
-
-
He, H.1
Ren, P.2
Du, Q.3
Sun, L.4
Wang, Y.5
-
9
-
-
34247581694
-
Performance analysis of cooperative diversity wireless networks over Nakagami-m fading channel
-
Apr.
-
S. Ikki and M. H. Ahmed, "Performance analysis of cooperative diversity wireless networks over Nakagami-m fading channel, " IEEE Commun. Lett., vol. 11, no. 4, pp. 334-336, Apr. 2007.
-
(2007)
IEEE Commun. Lett.
, vol.11
, Issue.4
, pp. 334-336
-
-
Ikki, S.1
Ahmed, M.H.2
-
10
-
-
0003498504
-
-
6th ed. New York, NY, USA: Academic Press
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series and Products, 6th ed. New York, NY, USA: Academic Press, 2000.
-
(2000)
Table of Integrals, Series and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
|