1 |
B. Zheng, M. Wen, C.-X. Wang, X. Wang, F. Chen, J. Tang, F. Ji., "Secure NOMA based two-way relay networks using artificial noise and full duplex, " IEEE J. Select. Areas Commun., vol. 36, no. 7, pp. 1426-1440, Jul. 2018.
DOI
|
2 |
E. Shafie, A. Sultan, I. Krikidis, N. Al-Dhahir, and R. Hamila, "Achievable rates of buffer-aided full-duplex Gaussian relay channels," IEEE Access, vol. 5, pp. 23776-23791, Oct. 2017.
DOI
|
3 |
C. S. Zhang, F. Jia, J. Ge, and F. Gong, "Security-reliability tradeoff for secure relaying systems with full-duplex radio, " IEEE Access, vol. 6, pp. 60862-60868, 2018.
DOI
|
4 |
P. K. Upadhyay, and S. Prakriya, "Performance of analog network coding with asymmetric traffic requirements," IEEE Commun. Lett., vol. 15, no. 6, pp. 647-649, Jun. 2011.
DOI
|
5 |
P. A. Anghel, and M. Kaveh, "Exact symbol error probability of a cooperative network in a Rayleigh-fading environment," IEEE Trans. Wireless Commun., vol. 3, pp. 1416-1421, Sep. 2004.
DOI
|
6 |
V. D. Waerden, and B. Leendert, The Galois theory: Equations of the second, third, and fourth degrees, Algebra, 1 (7th ed.), Springer-Verlag, 1991.
|
7 |
S. Boyd, and L. Vandenberghe, "Convex optimization," Cambridge, U.K.: Cambridge Univ. Press, 2004.
|
8 |
F. Gong, G. Li , J. Ge ; J. Yuan, "Distributed concatenated recursive Alamouti-circulant STBC for two-way multi-relay networks," IEEE Trans. on Commun., vol. 64, no.8, pp.3262-3274, Aug. 2016.
DOI
|
9 |
K. Yang, N. Yang, N. Ye, M. Jia, Z. Gao, and R. Fan, "Non-orthogonal multiple access: achieving sustainable future radio access," IEEE Commun. Magazine, vol. 57, no. 2, pp. 116-121, Feb. 2019.
DOI
|
10 |
X. Gao, P. Wang, D. Niyato, K. Yang, and J. An, "Auction-based time scheduling for backscatter-aided RF-powered cognitive radio networks," IEEE Trans. on Wireless Commun., vol. 18, no. 3, pp. 1684-1697, Mar. 2019.
DOI
|
11 |
J. An, K. Yang, J. Wu, N. Ye, S. Guo, and Z. Liao, "Achieving sustainable ultra-dense heterogeneous networks for 5G," IEEE Commun. Magazine, vol. 55, no. 12, pp. 84-90, Dec. 2017.
DOI
|
12 |
C. S. Zhang, J. H. Ge, J. Li, Y. Rui, and M. Guizani, "A unified approach for calculating outage performance of two-way AF relaying over fading channels," IEEE Trans. Veh. Technol., vol. 64, no. 3, pp. 1218-1229, Mar. 2015.
DOI
|
13 |
Y. Shin, and S. J. Baek, "Cooperative buffer-aided relaying using full-duplex relays with flow control," IEEE Trans. on Veh. Technol., vol. 68, no. 2, pp. 1824-1838, Feb. 2019.
DOI
|
14 |
Y. Li, Y. Z. Li, X. Chu, Y. Ye, and H. Zhang, "Performance analysis of relay selection in cooperative NOMA networks," IEEE Commun. Letters, vol. 23, no. 4, pp. 760-763, Apr. 2019.
DOI
|
15 |
G. Kramer, M. Gastpar, and P. Gupta, "Cooperative strategies and capacity theorems for relay networks," IEEE Trans. Inf. Theory, vol. 51, no. 9, pp. 3037-3063, Sep. 2005.
DOI
|
16 |
L. Lu, D. W. He, Q. Q. Xie, G. Y. Li, and X. X. Yu, "Graph-based path selection and power allocation for DF relay-aided transmission," IEEE Wireless Commun. Letters, vol. 7, no. 1, pp. 138-141, Feb. 2018.
DOI
|
17 |
B. Rankov and A. Wittneben, "Spectral efficiency protocols for half-duplex fading relay channels," IEEE J. Select. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007.
DOI
|
18 |
S. L. Zhang, C. S. Liew and P. P. Lam, "Hot topic: physical-layer network coding," in Proc. of ACM Mobicom, pp.358-365, 2006.
|
19 |
K. Singh, M. Lin Ku and J. C. Lin, "Power allocation and relay selection in relay networks: A perturbation-based approach," IEEE Signal Processing Letters, vol. 24, no. 9, pp. 1328-1332, Jul. 2017.
DOI
|
20 |
C. S. Zhang, J. H. Ge, J. Li, Y. Rui, and M. Guizani, "A unified approach for calculating outage performance of two-way AF relaying over fading channels," IEEE Trans. Veh. Technol., vol. 64, no. 3, pp. 1218-1229, Mar. 2015.
DOI
|
21 |
J. Zhu, Y. Zou, and B. Zheng, "Physical-layer security and reliability challenges for industrial wireless sensor networks," IEEE Access, vol. 5, pp. 5313-5320, Apr. 2017.
DOI
|
22 |
Y. Zou, "Physical-layer security for spectrum sharing systems," IEEE Trans. Wireless Commun., vol. 16, pp. 1319-1329, Feb. 2017.
DOI
|
23 |
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. on Inf. Forensics and Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
DOI
|
24 |
F. Jiang, C. Zhu, J. Peng, W. Liu, Z. Zhu, and Y. He, "Joint relay and jammer selection and power control for physical layer security in two-way relay networks with imperfect CSI," Wireless Pers. Commun., vol. 85, no. 3, pp.841-862, Jun. 2015.
DOI
|
25 |
L. Chen, Q. P. Zhu, W. X. Meng, and Y. B. Hua, "Fast power allocation for secure communication with full-duplex radio," IEEE Trans. Signal Process., vol. 65, no. 14, pp. 3846-3861, Jul. 2017.
DOI
|
26 |
C. S. Zhang, J. H. Ge, J. Li, F. K. Gong, and H. Y. Ding, "Complexity-aware relay selection for 5G large-scale secure two-way relay systems," IEEE Trans. Veh. Technol., vol. 66, no. 6, pp. 5461-5465, Jun. 2017.
DOI
|
27 |
C. S. Zhang, and J. H. Ge, "Partial jamming for secure two-way relay systems without wiretap information: one >two," Wireless Pers. Commun., vol. 95, no. 4, pp. 4013-4024, Aug. 2017.
DOI
|
28 |
C. Zhang, J. Ge, Z. Xia, and H. Wang, "A novel half-jamming protocol for secure two-way relay systems using a full-duplex jamming relay," in Proc. of 2017 3rd IEEE International Conference on Computer and Communications (ICCC), IEEE, pp. 786-790, 2017.
|
29 |
Y. Hua, P. Liang, Y. Ma, A. C. Cirik, and Q. Gao, "A method for broadband full-duplex MIMO radio," IEEE Signal Process. Lett., vol. 19, no. 12, pp. 793-796, Dec. 2012.
DOI
|
30 |
W. Li, M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
DOI
|
31 |
G. J. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system," IEEE Trans. on Info. Forensics and Security, vol. 10, no. 3, pp. 574-583, Jan. 2015.
DOI
|