Interference exploitation in D2D-enabled cellular networks: A secrecy perspective

C Ma, J Liu, X Tian, H Yu, Y Cui… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Device-to-device (D2D) communication underlaying cellular networks is a promising
technology to improve network resource utilization. In D2D-enabled cellular networks …

[引用][C] Interference Exploitation in D2D-enabled Cellular Networks: A Secrecy Perspective

C Ma, J Liu, X Tian, H Yu, Y Cui, X Wang - IEEE Transactions on …, 2014 - cir.nii.ac.jp
Interference Exploitation in D2D-enabled Cellular Networks: A Secrecy Perspective | CiNii
Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 …

[PDF][PDF] Interference Exploitation in D2D-enabled Cellular Networks: A Secrecy Perspective

C Ma, J Liu, X Tian, H Yu, Y Cui, X Wang - scholar.archive.org
Device-to-device (D2D) communication underlaying cellular networks is a promising
technology to improve network resource utilization. In D2D-enabled cellular networks …

Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective

C Ma, J Liu, X Tian, H Yu, Y Cui, X Wang - IEEE Transactions on …, 2015 - infona.pl
Device-to-device (D2D) communication underlaying cellular networks is a promising
technology to improve network resource utilization. In D2D-enabled cellular networks …