Computer Science ›› 2017, Vol. 44 ›› Issue (9): 172-177.doi: 10.11896/j.issn.1002-137X.2017.09.033
Previous Articles Next Articles
ZHANG Pei, ZHANG Jian-ming and WANG Liang-min
[1] CHEN Y,ZHANG S,XU S,et al.Fundamental trade-offs on green wireless networks[J].IEEE Communications Magazine,2011,49(6):30-37. [2] NOSRATINIA A,HUNTER T E,Hedayat A.Cooperative com-munication in wireless networks[J].IEEE Communications Magazine,2004,42(10):74-80. [3] HAYKIN S.Cognitive radio:brain-empowered wireless communications[J].IEEE Journal on Selected Areas in Communications,2005,23(2):201-220. [4] ZHANG D D,WANG X,ZHANG Z S.Key techniques research on full duplex wireless communications[J].Science in China Series F:Information Science,2014,4(8):951-964.(in Chinese) 张丹丹,王兴,张中山.全双工通信关键技术研究[J].中国科学:信息科学,2014,4(8):951-964. [5] COVER T,GAMAL A E L.Capacity theorems for the relay channel[J].IEEE Transactions on Information Theory,1979,25(5):572-584. [6] WANG Q H,WANG H M,YIN Q Y.Distributed beamforming for multi-relay cognitive radio systems[J].Science in China Series F:Information Sciences,2014,44(8):980-992.(in Chinese) 王群欢,王慧明,殷勤业.认知无线电系统中的多中继分布式波束成形方法[J].中国科学:信息科学,2014,44(8):980-992. [7] LI Y,SUN L,ZHAO C,et al.A digital self-interference cancellation algorithm based on spectral estimation in co-time co-frequency full duplex system[C]∥2015 10th International Confe-rence on Computer Science & Education (ICCSE).IEEE,2015:412-415. [8] MUKHERJEE A,FAKOORIAN S A A,HUANG J,et al.Principles of physical layer security in multiuser wireless networks:A survey[J].IEEE Communications Surveys & Tutorials,2014,16(3):1550-1573. [9] LI L,HUANG C,CHEN Z.Cooperative secrecy beamforming in wiretap interference channels[J].IEEE Signal Processing Letters,2015,22(12):2435-2439. [10] GOEL S,NEGI R.Guaranteeing secrecy using artificial noise[J].IEEE Transactions on Wireless Communications,2008,7(6):2180-2189. [11] CHEN J,ZHANG R,SONG L,et al.Joint relay and jammer selection for secure decode-and-forward two-way relay networks[C]∥IEEE International Conference Proc.of communications (ICC).2011. [12] CHEN J,ZHANG R,SONG L,et al.Joint relay and jammer selection for secure two-way relay networks[J].IEEE Transactions on Information Forensics and Security,2012,7(1):310-320. [13] FRAGKIADAKIS A G,TRAGOS E Z,A SKOXYLAKIS I G.A survey on security threats and detection techniques in cognitive radio networks[J].IEEE Communications Surveys & Tutorials,2013,15(1):428-445. [14] PEI Y,LIANG Y C,ZHANG L,et al.Secure communicationover MISO cognitive radio channels[J].IEEE Transactions on Wireless Communications,2010,9(4):1494-1502. [15] PEI Y,LIANG Y C,TEH K C,et al.Secure communication in multiantenna cognitive radio networks with imperfect channel state information[J].IEEE Transactions on Signal Processing,2011,59(4):1683-1693. [16] WANG C,WANG H M.On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1814-1827. [17] ALAVI F,SAEEDI H.Radio resource allocation to providephysical layer security in relay-assisted cognitive radio networks[J].IET Communications,2015,9(17):2124-2130. [18] ZOU Y,ZHU J,YANG L,et al.Securing physical-layer communications for cognitive radio networks[J].IEEE Communications Magazine,2015,53(9):48-54. [19] ZHU F,YAO M.Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming[J].IEEE Tran-sactions on Vehicular Technology,2016,65(3):1835-1841. [20] LUO Z Q,MA W,SO A M C,et al.Semidefinite relaxation of quadratic optimization problems[J].IEEE Signal Processing Magazine,2010,27(3):20. [21] GRANT M,BOYD S,YE Y.CVX:Matlab software for disci-plined convex programming[J].Golbal Optimization,2008:155-210. [22] SIDIROPOULOS N D,DAVIDSON T N,L UO Z Q.Transmit beamforming for physical-layer multicasting[J].IEEE Transactions on Signal Processing,2006,54(6):2239-2251. |
No related articles found! |
|