[PDF][PDF] 博士™ 文

NIU Hao - 2015 - repository.dl.itc.u-tokyo.ac.jp
cooperative relays themselves are the eavesdroppers in this case, the cooperative security
… utilities and intend to be freeriders in cooperative communication systems. As a result, all of …

无线协作网络中的最优中继选择方案及中断概率分析

冯友宏, 杨志, 丁绪星, 岳雪峰, 李琦琦, 谢小娟 - 电信科学, 2018 - infocomm-journal.com
… The optimal relay selection schemes for relay transmission system with multiple single-…
Optimal relay selection for secure cooperative communications with an adaptive eavesdropper[J]. …

存在能量捕获窃听者时安全AF 中继网络的联合协作波束成形与人工噪声设计

H Niu, B Zhang, D Guo, Y Huang, M Lu, AH Niu… - Frontiers, 2017 - jzus.zju.edu.cn
… noise scheme for secure communication and efficient wireless … eavesdropper and assuming
that only imperfect channel state information can be obtained, we formulate an optimization

[HTML][HTML] 5G 网络空间安全对抗博弈

徐瑨, 吴慧慈, 陶小峰 - 电子与信息学报, 2020 - jeit.ac.cn
… active eavesdropping attacks in cooperative communication[J]. … adaptive eavesdroppers
in multi-antenna cellular networks[J]. IEEE Transactions on Information Forensics and Security

自适应调制MIMO 无线系统的物理层安全

李辉, 李光球, 罗延翠, 刘会芝 - 电信科学, 2023 - infocomm-journal.com
security (PLS) in single-input single-output (SISO) wireless systems with adaptive modulation
in the presence of an active eavesdrop… wireless systems with secure adaptive modulation (…

基于统计信道信息的两用户单输入单输出干扰信道的遍历安全速率

ZS Fei, JQ Ni, D Zhao, CW Xing, NW Wang… - Science China …, 2014 - Springer
cooperative communication employing relays, ref. [13] … communication and derived an
outer-bound on the optimal rate-equivocation region based on a four-terminal relay-eavesdropper

基于相关信道模型的两跳无线网络安全通信研究

Z Yuan, C Chen, X Cheng, G Lv, L Yang, Y Jin… - Frontiers, 2017 - jzus.zju.edu.cn
… legitimate and eavesdropping channels. Depending on this information, we derive the
conditional distribution of the eavesdropping channel. Two beamformers at the relay are studied …

双向认知网络物理层安全策略建模及仿真研究

潘蕾, 李赞, 张志利, 李向阳 - 系统仿真学报, 2021 - china-simulation.com
security transmission models of a two-way cognitive relay network with the primary network
and eavesdropper are established, and a joint optimization strategy for relay selection and …

基于非线性能量收集器的无线充电中继系统保密中断性能分析

J Zhang, G Pan, Y Xie, AJ Zhang, AG Pan, AY Xie - Frontiers, 2017 - jzus.zju.edu.cn
cooperative system consisting of a source node, a destination node, N (N>1) wireless-powered
relays, and an eavesdropper… , the Kth best relay is selected to assist the source-relay-…

[PDF][PDF] 基于中继间干扰消除的轮流转发系统安全传输方案

邹羿, 黄开枝, 康小磊 - Journal on Communications, 2017 - infocomm-journal.com
relay interference between trusted relay and untrusted relay was exploited as artificial noise
to degrade untrusted relay’s eavesdropping … cancellation was adapted to improve signal …