-
1
-
-
85012972036
-
Application of non-orthogonal multiple access in LTE and 5g networks
-
February
-
Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C.-L. I, and H. V. Poor. Application of non-orthogonal multiple access in LTE and 5G networks. IEEE Commun. Mag., 55 (2): 185-191, February 2017.
-
(2017)
IEEE Commun. Mag
, vol.55
, Issue.2
, pp. 185-191
-
-
Ding, Z.1
Liu, Y.2
Choi, J.3
Sun, Q.4
Elkashlan, M.5
Li, C.-L.6
Poor, H.V.7
-
3
-
-
84969752708
-
Secrecy sum rate maximization in non-orthogonal multiple access
-
May
-
Y. Zhang, H. M. Wang, Q. Yang, and Z. Ding. Secrecy sum rate maximization in non-orthogonal multiple access. IEEE Commun. Lett., 20 (5): 930-933, May 2016.
-
(2016)
IEEE Commun. Lett
, vol.20
, Issue.5
, pp. 930-933
-
-
Zhang, Y.1
Wang, H.M.2
Yang, Q.3
Ding, Z.4
-
4
-
-
85015293638
-
Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks
-
March
-
Y. Liu, Z. Qin, M. Elkashlan, Y. Gao, and L. Hanzo. Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks. IEEE Trans. Wireless Commun., 16 (3): 1656-1672, March 2017.
-
(2017)
IEEE Trans. Wireless Commun
, vol.16
, Issue.3
, pp. 1656-1672
-
-
Liu, Y.1
Qin, Z.2
Elkashlan, M.3
Gao, Y.4
Hanzo, L.5
-
6
-
-
85028978097
-
On the spectral efficiency and security enhancements of noma assisted multicast-unicast streaming
-
July
-
Z. Ding, Z. Zhao, M. Peng, and H. V. Poor. On the spectral efficiency and security enhancements of NOMA assisted multicast-unicast streaming. IEEE Trans. Commun., 65 (7): 3151-3163, July 2017.
-
(2017)
IEEE Trans. Commun
, vol.65
, Issue.7
, pp. 3151-3163
-
-
Ding, Z.1
Zhao, Z.2
Peng, M.3
Poor, H.V.4
-
7
-
-
85028420472
-
Secrecy sum rate optimization for downlink MIMO nonorthogonal multiple access systems
-
August
-
M. Tian, Q. Zhang, S. Zhao, Q. Li, and J. Qin. Secrecy sum rate optimization for downlink MIMO nonorthogonal multiple access systems. IEEE Signal Process. Lett., 24 (8): 1113-1117, August 2017.
-
(2017)
IEEE Signal Process. Lett
, vol.24
, Issue.8
, pp. 1113-1117
-
-
Tian, M.1
Zhang, Q.2
Zhao, S.3
Li, Q.4
Qin, J.5
-
8
-
-
85029499325
-
Secure beamforming in downlink MISO nonorthogonal multiple access systems
-
August
-
Y. Li, M. Jiang, Q. Zhang, Q. Li, and J. Qin. Secure beamforming in downlink MISO nonorthogonal multiple access systems. IEEE Trans. Veh. Technol., 66 (8): 7563-7567, August 2017.
-
(2017)
IEEE Trans. Veh. Technol
, vol.66
, Issue.8
, pp. 7563-7567
-
-
Li, Y.1
Jiang, M.2
Zhang, Q.3
Li, Q.4
Qin, J.5
-
9
-
-
85038256513
-
Secure beamforming in downlink MIMO nonorthogonal multiple access networks
-
December
-
M. Jiang, Y. Li, Q. Zhang, Q. Li, and J. Qin. Secure beamforming in downlink MIMO nonorthogonal multiple access networks. IEEE Signal Process. Lett., 24 (12): 1852-1856, December 2017.
-
(2017)
IEEE Signal Process. Lett
, vol.24
, Issue.12
, pp. 1852-1856
-
-
Jiang, M.1
Li, Y.2
Zhang, Q.3
Li, Q.4
Qin, J.5
-
10
-
-
85029009637
-
On secure noma systems with transmit antenna selection schemes
-
September
-
H. Lei, J. Zhang, K. H. Park, P. Xu, I. S. Ansari, G. Pan, B. Alomair, and M. S. Alouini. On secure NOMA systems with transmit antenna selection schemes. IEEE Access, 5: 17450-17464, September 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 17450-17464
-
-
Lei, H.1
Zhang, J.2
Park, K.H.3
Xu, P.4
Ansari, I.S.5
Pan, G.6
Alomair, B.7
Alouini, M.S.8
-
11
-
-
85028930659
-
On the design of secure non-orthogonal multiple access systems
-
October
-
B. He, A. Liu, N. Yang, and V. K. N. Lau. On the design of secure non-orthogonal multiple access systems. IEEE J. Sel. Areas Commun., 35 (10): 2196-2206, October 2017.
-
(2017)
IEEE J. Sel. Areas Commun
, vol.35
, Issue.10
, pp. 2196-2206
-
-
He, B.1
Liu, A.2
Yang, N.3
Lau, V.K.N.4
-
12
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
September
-
L. Lai and H. El Gamal. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory, 54 (9): 4005-4019, September 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
13
-
-
84874906565
-
Deaf cooperation and relay selection strategies for secure communication in multiple relay networks
-
March
-
R. Bassily and S. Ulukus. Deaf cooperation and relay selection strategies for secure communication in multiple relay networks. IEEE Trans. Signal Process., 61 (6): 1544-1554, March 2013.
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.6
, pp. 1544-1554
-
-
Bassily, R.1
Ulukus, S.2
-
14
-
-
84870266491
-
Deaf cooperation for secrecy with multiple antennas at the helper
-
December
-
R. Bassily and S. Ulukus. Deaf cooperation for secrecy with multiple antennas at the helper. IEEE Trans. Inf. Forensics Security, 7 (6): 1855-1864, December 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.6
, pp. 1855-1864
-
-
Bassily, R.1
Ulukus, S.2
-
15
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
December
-
X. He and A. Yener. Two-hop secure communication using an untrusted relay: A case for cooperative jamming. In Proc. IEEE Globecom, December 2008.
-
(2008)
Proc. IEEE Globecom
-
-
He, X.1
Yener, A.2
-
16
-
-
85028337438
-
Multi-terminal two-hop untrusted-relay networks with hierarchical security guarantees
-
September
-
A. Zewail and A. Yener. Multi-terminal two-hop untrusted-relay networks with hierarchical security guarantees. IEEE Trans. Inf. Forensics Security, 12 (9): 2052-2066, September 2017.
-
(2017)
IEEE Trans. Inf. Forensics Security
, vol.12
, Issue.9
, pp. 2052-2066
-
-
Zewail, A.1
Yener, A.2
-
17
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
August
-
X. He and A. Yener. Cooperation with an untrusted relay: A secrecy perspective. IEEE Trans. Inf. Theory, 56 (8): 3807-3827, August 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
18
-
-
85032751357
-
Cooperative security at the physical layer: A summary of recent advances
-
September
-
R. Bassily, E. Ekrem, X. He, E. Tekin, J. Xie, M. R. Bloch, S. Ulukus, and A. Yener. Cooperative security at the physical layer: A summary of recent advances. IEEE Signal Process. Mag., 30 (5): 16-28, September 2013.
-
(2013)
IEEE Signal Process. Mag
, vol.30
, Issue.5
, pp. 16-28
-
-
Bassily, R.1
Ekrem, E.2
He, X.3
Tekin, E.4
Xie, J.5
Bloch, M.R.6
Ulukus, S.7
Yener, A.8
-
20
-
-
79952846257
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
April
-
E. Ekrem and S. Ulukus. The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel. IEEE Trans. Inf. Theory, 57 (4): 2083-2114, April 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2083-2114
-
-
Ekrem, E.1
Ulukus, S.2
|