메뉴 건너뛰기




Volumn 2018-October, Issue , 2018, Pages 1689-1693

Downlink Non-Orthogonal Multiple Access Systems with an Untrusted Relay

Author keywords

[No Author keywords available]

Indexed keywords

RELAY CONTROL SYSTEMS;

EID: 85062955742     PISSN: 10586393     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSSC.2018.8645185     Document Type: Conference Paper
Times cited : (3)

References (20)
  • 1
    • 85012972036 scopus 로고    scopus 로고
    • Application of non-orthogonal multiple access in LTE and 5g networks
    • February
    • Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C.-L. I, and H. V. Poor. Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Commun. Mag., 55 (2): 185-191, February 2017.
    • (2017) IEEE Commun. Mag , vol.55 , Issue.2 , pp. 185-191
    • Ding, Z.1    Liu, Y.2    Choi, J.3    Sun, Q.4    Elkashlan, M.5    Li, C.-L.6    Poor, H.V.7
  • 3
    • 84969752708 scopus 로고    scopus 로고
    • Secrecy sum rate maximization in non-orthogonal multiple access
    • May
    • Y. Zhang, H. M. Wang, Q. Yang, and Z. Ding. Secrecy sum rate maximization in non-orthogonal multiple access. IEEE Commun. Lett., 20 (5): 930-933, May 2016.
    • (2016) IEEE Commun. Lett , vol.20 , Issue.5 , pp. 930-933
    • Zhang, Y.1    Wang, H.M.2    Yang, Q.3    Ding, Z.4
  • 4
    • 85015293638 scopus 로고    scopus 로고
    • Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks
    • March
    • Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wireless Commun., 16 (3): 1656-1672, March 2017.
    • (2017) IEEE Trans. Wireless Commun , vol.16 , Issue.3 , pp. 1656-1672
    • Liu, Y.1    Qin, Z.2    Elkashlan, M.3    Gao, Y.4    Hanzo, L.5
  • 6
    • 85028978097 scopus 로고    scopus 로고
    • On the spectral efficiency and security enhancements of noma assisted multicast-unicast streaming
    • July
    • Z. Ding, Z. Zhao, M. Peng, and H. V. Poor. On the spectral efficiency and security enhancements of NOMA assisted multicast-unicast streaming. IEEE Trans. Commun., 65 (7): 3151-3163, July 2017.
    • (2017) IEEE Trans. Commun , vol.65 , Issue.7 , pp. 3151-3163
    • Ding, Z.1    Zhao, Z.2    Peng, M.3    Poor, H.V.4
  • 7
    • 85028420472 scopus 로고    scopus 로고
    • Secrecy sum rate optimization for downlink MIMO nonorthogonal multiple access systems
    • August
    • M. Tian, Q. Zhang, S. Zhao, Q. Li, and J. Qin. Secrecy sum rate optimization for downlink MIMO nonorthogonal multiple access systems. IEEE Signal Process. Lett., 24 (8): 1113-1117, August 2017.
    • (2017) IEEE Signal Process. Lett , vol.24 , Issue.8 , pp. 1113-1117
    • Tian, M.1    Zhang, Q.2    Zhao, S.3    Li, Q.4    Qin, J.5
  • 8
    • 85029499325 scopus 로고    scopus 로고
    • Secure beamforming in downlink MISO nonorthogonal multiple access systems
    • August
    • Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin. Secure beamforming in downlink MISO nonorthogonal multiple access systems. IEEE Trans. Veh. Technol., 66 (8): 7563-7567, August 2017.
    • (2017) IEEE Trans. Veh. Technol , vol.66 , Issue.8 , pp. 7563-7567
    • Li, Y.1    Jiang, M.2    Zhang, Q.3    Li, Q.4    Qin, J.5
  • 9
    • 85038256513 scopus 로고    scopus 로고
    • Secure beamforming in downlink MIMO nonorthogonal multiple access networks
    • December
    • M. Jiang, Y. Li, Q. Zhang, Q. Li, and J. Qin. Secure beamforming in downlink MIMO nonorthogonal multiple access networks. IEEE Signal Process. Lett., 24 (12): 1852-1856, December 2017.
    • (2017) IEEE Signal Process. Lett , vol.24 , Issue.12 , pp. 1852-1856
    • Jiang, M.1    Li, Y.2    Zhang, Q.3    Li, Q.4    Qin, J.5
  • 11
    • 85028930659 scopus 로고    scopus 로고
    • On the design of secure non-orthogonal multiple access systems
    • October
    • B. He, A. Liu, N. Yang, and V. K. N. Lau. On the design of secure non-orthogonal multiple access systems. IEEE J. Sel. Areas Commun., 35 (10): 2196-2206, October 2017.
    • (2017) IEEE J. Sel. Areas Commun , vol.35 , Issue.10 , pp. 2196-2206
    • He, B.1    Liu, A.2    Yang, N.3    Lau, V.K.N.4
  • 12
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • September
    • L. Lai and H. El Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory, 54 (9): 4005-4019, September 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    El Gamal, H.2
  • 13
    • 84874906565 scopus 로고    scopus 로고
    • Deaf cooperation and relay selection strategies for secure communication in multiple relay networks
    • March
    • R. Bassily and S. Ulukus. Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Trans. Signal Process., 61 (6): 1544-1554, March 2013.
    • (2013) IEEE Trans. Signal Process , vol.61 , Issue.6 , pp. 1544-1554
    • Bassily, R.1    Ulukus, S.2
  • 14
    • 84870266491 scopus 로고    scopus 로고
    • Deaf cooperation for secrecy with multiple antennas at the helper
    • December
    • R. Bassily and S. Ulukus. Deaf cooperation for secrecy with multiple antennas at the helper. IEEE Trans. Inf. Forensics Security, 7 (6): 1855-1864, December 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.6 , pp. 1855-1864
    • Bassily, R.1    Ulukus, S.2
  • 15
    • 67249087217 scopus 로고    scopus 로고
    • Two-hop secure communication using an untrusted relay: A case for cooperative jamming
    • December
    • X. He and A. Yener. Two-hop secure communication using an untrusted relay: A case for cooperative jamming. In Proc. IEEE Globecom, December 2008.
    • (2008) Proc. IEEE Globecom
    • He, X.1    Yener, A.2
  • 16
    • 85028337438 scopus 로고    scopus 로고
    • Multi-terminal two-hop untrusted-relay networks with hierarchical security guarantees
    • September
    • A. Zewail and A. Yener. Multi-terminal two-hop untrusted-relay networks with hierarchical security guarantees. IEEE Trans. Inf. Forensics Security, 12 (9): 2052-2066, September 2017.
    • (2017) IEEE Trans. Inf. Forensics Security , vol.12 , Issue.9 , pp. 2052-2066
    • Zewail, A.1    Yener, A.2
  • 17
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • August
    • X. He and A. Yener. Cooperation with an untrusted relay: A secrecy perspective. IEEE Trans. Inf. Theory, 56 (8): 3807-3827, August 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 20
    • 79952846257 scopus 로고    scopus 로고
    • The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
    • April
    • E. Ekrem and S. Ulukus. The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel. IEEE Trans. Inf. Theory, 57 (4): 2083-2114, April 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.4 , pp. 2083-2114
    • Ekrem, E.1    Ulukus, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.