Tài liệu tham khảo |
Loại |
Chi tiết |
[2] T. X. Quach, H. Tran, E. Uhlemann, G. Kaddoum, and Q. A. Tran, “Powerallocation policy and performance analysis of secure and reliable communication in cognitive radio networks,” Wirel. Netw., vol. 25, no. 4, pp. 1477–1489, May 2019, doi: 10.1007/s11276-017-1605-z |
Sách, tạp chí |
Tiêu đề: |
Powerallocation policy and performance analysis of secure and reliable communication incognitive radio networks,”" Wirel. Netw |
|
[3] O. G. Aliu, A. Imran, M. A. Imran, and B. Evans, “A Survey of Self Organisation in Future Cellular Networks,” IEEE Commun. Surv. Tutor., vol. 15, no. 1, pp. 336– |
Sách, tạp chí |
Tiêu đề: |
A Survey of Self Organisation inFuture Cellular Networks,”" IEEE Commun. Surv. Tutor |
|
[4] S. Shafiee and S. Ulukus, “Achievable Rates in Gaussian MISO Channels with Secrecy Constraints,” in 2007 IEEE International Symposium on Information Theory, Jun. 2007, pp. 2466–2470. doi: 10.1109/ISIT.2007.4557589 |
Sách, tạp chí |
Tiêu đề: |
Achievable Rates in Gaussian MISO Channels withSecrecy Constraints,” in" 2007 IEEE International Symposium on Information"Theory |
|
[5] R. Bustin, R. Liu, H. V. Poor, and S. Shamai, “An MMSE approach to the secrecy capacity of the MIMO Gaussian wiretap channel,” in 2009 IEEE International Symposium on Information Theory, Jun. 2009, pp. 2602–2606. doi:10.1109/ISIT.2009.5205967 |
Sách, tạp chí |
Tiêu đề: |
An MMSE approach to the secrecycapacity of the MIMO Gaussian wiretap channel,” in" 2009 IEEE International"Symposium on Information Theory |
|
[6] S. A. A. Fakoorian and A. L. Swindlehurst, “Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer,” IEEE Trans. Signal Process., vol |
Sách, tạp chí |
Tiêu đề: |
Solutions for the MIMO GaussianWiretap Channel With a Cooperative Jammer,”" IEEE Trans. Signal Process |
|
[7] “Rayleigh Fading - an overview | ScienceDirect Topics.”https://www.sciencedirect.com/topics/computer-science/rayleigh-fading (accessed Oct. 09, 2020) |
Sách, tạp chí |
Tiêu đề: |
Rayleigh Fading - an overview | ScienceDirect Topics |
|
[8] M. O. Hasna and M.-S. Alouini, “End-to-end performance of transmission systems with relays over Rayleigh-fading channels,” IEEE Trans. Wirel. Commun., vol. 2, no. 6, pp. 1126–1131, Nov. 2003, doi: 10.1109/TWC.2003.819030 |
Sách, tạp chí |
Tiêu đề: |
End-to-end performance of transmission systemswith relays over Rayleigh-fading channels,”" IEEE Trans. Wirel. Commun |
|
[9] Jiann-Ching Guey, M. P. Fitz, M. R. Bell, and Wen-Yi Kuo, “Signal design for transmitter diversity wireless communication systems over Rayleigh fading channels,” IEEE Trans. Commun., vol. 47, no. 4, pp. 527–537, Apr. 1999, doi:10.1109/26.764926 |
Sách, tạp chí |
Tiêu đề: |
Signal design fortransmitter diversity wireless communication systems over Rayleigh fadingchannels,”" IEEE Trans. Commun |
|
[10] M. Hanif and H. H. Nguyen, “Non-Coherent Index Modulation in Rayleigh Fading Channels,” IEEE Commun. Lett., vol. 23, no. 7, pp. 1153–1156, Jul. 2019, doi:10.1109/LCOMM.2019.2917085 |
Sách, tạp chí |
Tiêu đề: |
Non-Coherent Index Modulation in Rayleigh FadingChannels,”" IEEE Commun. Lett |
|
[11] J. Yu et al., “Efficient Link Scheduling in Wireless Networks Under Rayleigh- Fading and Multiuser Interference,” IEEE Trans. Wirel. Commun., vol. 19, no. 8, pp. 5621–5634, Aug. 2020, doi: 10.1109/TWC.2020.2994998 |
Sách, tạp chí |
Tiêu đề: |
et al.", “Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference,”" IEEE Trans. Wirel. Commun |
|
[12] M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. 2011. doi: 10.1017/CBO9780511977985 |
Sách, tạp chí |
Tiêu đề: |
Physical-Layer Security: From Information Theory to"Security Engineering |
|
[13] A. Beck and N. Guttmann-Beck, “FOM – a MATLAB toolbox of first-order methods for solving convex optimization problems,” Optim. Methods Softw., vol |
Sách, tạp chí |
Tiêu đề: |
FOM – a MATLAB toolbox of first-ordermethods for solving convex optimization problems,”" Optim. Methods Softw |
|
[16] S. Kum and S. Yun, “Incremental Gradient Method for Karcher Mean onSymmetric Cones,” J. Optim. Theory Appl., vol. 172, no. 1, pp. 141–155, Jan. 2017, doi: 10.1007/s10957-016-1000-4 |
Sách, tạp chí |
Tiêu đề: |
Incremental Gradient Method for Karcher Mean onSymmetric Cones,”" J. Optim. Theory Appl |
|
[17] T. chí A. toàn thông tin, “NSA nghiên cứu máy tính lượng tử phá vỡ mọi loại mật mã - Tạp chí An toàn thông tin,” An Toan Thong Tin.http://antoanthongtin.gov.vn/an-toan-thong-tin/chi-tiet-bai-viet-cua-100724(accessed Mar. 25, 2020) |
Sách, tạp chí |
Tiêu đề: |
NSA nghiên cứu máy tính lượng tử phá vỡ mọi loại mậtmã - Tạp chí An toàn thông tin,”" An Toan Thong Tin |
|
[18] I. Csiszar and J. Korner, “Broadcast channels with confidential messages,” IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339–348, May 1978, doi:10.1109/TIT.1978.1055892 |
Sách, tạp chí |
Tiêu đề: |
Broadcast channels with confidential messages,”" IEEE"Trans. Inf. Theory |
|
[19] F. Jameel, S. Wyne, G. Kaddoum, and T. Q. Duong, “A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security,” IEEE Commun. Surv. Tutor., vol. 21, no. 3, pp. 2734–2771, 2019, doi:10.1109/COMST.2018.2865607 |
Sách, tạp chí |
Tiêu đề: |
A Comprehensive Survey onCooperative Relaying and Jamming Strategies for Physical Layer Security,”" IEEE"Commun. Surv. Tutor |
|
[20] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey,” IEEE Commun. Surv. Tutor., vol. 16, no. 3, pp. 1550–1573, 2014, doi:10.1109/SURV.2014.012314.00178 |
Sách, tạp chí |
Tiêu đề: |
Principlesof Physical Layer Security in Multiuser Wireless Networks: A Survey,”" IEEE"Commun. Surv. Tutor |
|
[21] X. Chen, D. W. K. Ng, W. H. Gerstacker, and H.-H. Chen, “A Survey onMultiple-Antenna Techniques for Physical Layer Security,” IEEE Commun. Surv.Tutor., vol. 19, no. 2, pp. 1027–1053, Secondquarter 2017, doi:10.1109/COMST.2016.2633387 |
Sách, tạp chí |
Tiêu đề: |
A Survey onMultiple-Antenna Techniques for Physical Layer Security,”" IEEE Commun. Surv."Tutor |
|
[22] D. Wang, B. Bai, W. Zhao, and Z. Han, “A Survey of Optimization Approaches for Wireless Physical Layer Security,” ArXiv190107955 Cs Math, Jan. 2019, Accessed: Feb. 15, 2020. [Online]. Available: http://arxiv.org/abs/1901.07955 |
Sách, tạp chí |
Tiêu đề: |
A Survey of Optimization Approachesfor Wireless Physical Layer Security,”" ArXiv190107955 Cs Math |
|
[23] Y. Cheng and M. Pesavento, “Joint Optimization of Source Power Allocation and Distributed Relay Beamforming in Multiuser Peer-to-Peer Relay Networks,” IEEE Trans. Signal Process., vol. 60, no. 6, pp. 2962–2973, Jun. 2012, doi:10.1109/TSP.2012.2189388 |
Sách, tạp chí |
Tiêu đề: |
Joint Optimization of Source Power Allocation andDistributed Relay Beamforming in Multiuser Peer-to-Peer Relay Networks,”" IEEE"Trans. Signal Process |
|