Computer Science ›› 2019, Vol. 46 ›› Issue (5): 100-104.doi: 10.11896/j.issn.1002-137X.2019.05.015
Previous Articles Next Articles
LI Fang-wei, ZHOU Jia-wei, ZHANG Hai-bo
CLC Number:
[1]MUTHANNA A,MASEK P,HOSEK J,et al.Analytical Eva-luatation of D2D Connectivity Potential in 5G Wireless Systems∥International Conference on Next Generation Wired/wireless Networking.Springer International Publishing,2016. [2]WANG M,YAN Z.Security in D2D Communications:A Review∥IEEE Trustcom/bigdatase/ispa.IEEE Computer Society,Helsinki,2015:1199-1204. [3]QINA Z,WANG X.Reviews of D2D technology for 5G communication networks.Journal on Communications,2016,129:1-14. [4]BANAGAR M,MAHAM B,POPOVSKI P,et al.Power Distribution of Device-to-Device Communications in UnderlaidCellular Networks.IEEE Wireless Communications Letters,2015,5(2):204-207. [5]LUO Y,CUI L,YANG Y,et al.Power control and channel access for physical-layer security of D2D underlay communication∥International Conference on Wireless Communications & Signal Processing.Nanjing:IEEE Press,2015:1-5. [6]LIU G,FENG W,HAN Z.et al.Performance Analysis and Optimization of CooperativeFull-Duplex D2D CommunicationUnderlaying Cellular Networks.https://arxiv.org/pdf/1805.06645.pdf. [7]KANG X L,JI X S,HUANG K Z.SecureD2D underlaying cellular communication based on artificial noise assisted.Journal of communications,2015,36(10):149-156. [8]DOPPLER K,RINNE M P,PEKKA,et al.Device-to-DeviceCommunications;Functional Prospects for LTE-Advanced Networks∥IEEE International Conference on Communications Workshops.Dresden:IEEE,2009:1-6. [9]WANG L,WU H,STUBER G.Resource Allocation with Coope-rative Jamming in Socially Interactive Secure D2D Underlay∥IEEE Vehicular Technology Conference.Nanjing:IEEE Press,2016. [10]CHEN Y,JI X,HUANG K,et al.Secrecy analysis in D2D-enabled cellular networks against spatially random eavesdroppers∥International Symposium on Wireless Personal Multimedia Communications.Shenzhen:IEEE Press,2017:262-267. [11]QIU R C.A Theory of Time-Reversed Impulse Multiple-InputMultiple-Output (MIMO) for Ultra-Wideband (UWB) Communications∥IEEE 2006 International Conference on Ultra-Wideband.Waltham,MA,USA:IEEE,2007:587-592. [12]QI X L,HUGHES T L,ZHANGS C.Topological field theory of time-reversal invariant insulators.Physical Review B,2008,78(19):195424. [13]LI F W,ZHANG L L,ZHU J.A Mechanism of Radio Resource Optimization in Time-reversal Device-to-Device Communication .Journal of computer science,2017,45(10):78-82,98.(in Chinese)李方伟,张琳琳,朱江.D2D通信网络中一种基于时间反演的无线资源优化机制.计算机科学,2017,45(10):78-82,98. [14]ZHU J ,WANG Y ,YANG T,et al.Time-Reversal Based Secure Transmission Scheme for 5G Networks over Correlated Wireless Multi-Path Channels.https://link.springer.com/article/10.1007/s11277-018-5737-y. [15]TRAN H V,TRAN H,KADDOUM G,et al.Effective secrecy-SINR analysis of time reversal employed systems over correlated multi-path channel∥The 11th International Conference on Wireless and Mobile Computing,Networking and Communications.Abu Dhabi:IEEE Press,2015:527-532. [16]XU Q,REN P,DU Q,et al.Security-Aware Waveform and Artificial Noise Design for Time-Reversal-Based Transmission .IEEE Transactions on Vehicular Technology,2018,PP(99):1. [17]FOUDA A E,TEIXIERA F L,YAVUZ M E.Time-reversaltechniques for MISO and MIMO wireless communication systems .http://adsabs.harvard.edu/abs/2012RaSc...47.0P02F. [18]代彬.窃听信道及第二类穿听信道的新问题[D].上海:上海交通大学,2007. |
[1] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[2] | YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204. |
[3] | XU Hao, CAO Gui-jun, YAN Lu, LI Ke, WANG Zhen-hong. Wireless Resource Allocation Algorithm with High Reliability and Low Delay for Railway Container [J]. Computer Science, 2022, 49(6): 39-43. |
[4] | ZHANG Jie, YUE Shao-hua, WANG Gang, LIU Jia-yi, YAO Xiao-qiang. Multi-agent System Based on Stackelberg and Edge Laplace Matrix [J]. Computer Science, 2021, 48(8): 253-262. |
[5] | LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299. |
[6] | YUAN De-yu, CHEN Shi-cong, GAO Jian, WANG Xiao-juan. Intervention Algorithm for Distorted Information in Online Social Networks Based on Stackelberg Game [J]. Computer Science, 2021, 48(3): 313-319. |
[7] | BAO Jun-bo, YAN Guang-hui, LI Jun-cheng. SIR Propagation Model Combing Incomplete Information Game [J]. Computer Science, 2020, 47(6): 230-235. |
[8] | MENG Li-min, WANG Kun, ZHENG Zeng-qian, JIANG Wei. Architecture Strategy of D2D Content Edge Cache Based on Particle Swarm Optimization [J]. Computer Science, 2020, 47(11A): 345-348. |
[9] | ZHAI Yong, LIU Jin, LIU Lei, CHEN Jie. Analysis of Private Cloud Resource Allocation Management Based on Game Theory in Spatial Data Center [J]. Computer Science, 2020, 47(11A): 373-379. |
[10] | ZHANG Hui-juan, ZHANG Da-min, YAN Wei, CHEN Zhong-yun, XIN Zi-yun. Throughput Optimization Based Resource Allocation Mechanism in Heterogeneous Networks [J]. Computer Science, 2019, 46(10): 109-115. |
[11] | CHI Kai-kai, TANG Ze-feng, ZHU Yi-nan, SHAO Qi-ke. Efficient Multicast Schemes for D2D Multicast Cluster in Wireless Cellular Network [J]. Computer Science, 2019, 46(1): 169-174. |
[12] | LI Fang-wei HUANG Xu ZHANG Hai-bo LIU Kai-jian HE Xiao-fan. Cluster-based Radio Resource Allocation Mechanism in D2D Networks [J]. Computer Science, 2018, 45(9): 123-128. |
[13] | ZENG Jin-song, RAO Yun-bo. Intelligent Classification of Massive Information Based on Conflict Game Algorithm [J]. Computer Science, 2018, 45(8): 208-212. |
[14] | RAN Zheng, LUO Lei, YAN Hua, LI Yun. Nash Equilibrium Based Method for Mapping AUTOSAR Tasks to Multicore ECU [J]. Computer Science, 2018, 45(6): 166-171. |
[15] | ZHANG Pan-pan, PENG Chang-gen, HAO Chen-yan. Privacy Protection Model and Privacy Metric Methods Based on Privacy Preference [J]. Computer Science, 2018, 45(6): 130-134. |
|