[1] Doppler K,Rinne M,Cássio B.Device-to-device communication as an underlay to LTE-Advanced networks[J].IEEE Transactions on Communications Magazine,2009,47(12):42-49.
[2] Chunguo Li,John M Cioffi,Luxi Yang.Optimal energy efficient joint power allocation for two-hop single-antenna relaying systems[J].European Transactions on Telecommunications,2014,25(7):745-751.
[3] Chun G L,Xiang W,Lu X Y,Wei P Z.A joint source and relay power allocation scheme for a class of MIMO relay systems[J].IEEE Transactions on Signal Processing,2009,57(12):4852-4860.
[4] Chun G L,Fan S,John M C,Lu X Y.Energy efficient MIMO relay transmissions via joint power allocations[J].IEEE Transactions on Circuits and Systems-Ⅱ,2014,61(7):531-535.
[5] Chun G L,Hyun J Y,Fan S,John M C,Lu X Y.Multiuser overhearing for cooperative two-way multiantenna relays[J].IEEE Transactions on Vehicular Technology,2015,65(5):1-5.
[6] Wang L,Peng T,Yang Y.Interference constrained D2D communication with relay underlaying cellular networks[A].IEEE International Conference on Vehicular Technology Conference[C].Las Vegas:IEEE,2013.1-5.
[7] Zheng W C,Su Z,Shi X S.Research on relay selection in device-to-device communications based on maximum capacity[A].IEEE International Conference on Information Science,Electronics and Electrical Engineering[C].Sapporo:Institute of Electrical and Electronics Engineers Inc,2014.1429-1434.
[8] Vanganuru K,Ferrante S,Sternberg G.System capacity and coverage of a cellular network with D2D mobile relays[A].IEEE Conference on Military Communications Conference[C].Orlando:IEEE,2012.1-6.
[9] Peng Y,Gao Q,Sun S.Discovery of device-device proximity:Physical layer design for D2D discovery[A].IEEE International Conference on Communications in China-Workshops[C].Xi'an:IEEE,2013.176-181.
[10] YUE J,MA C,YU H,et al.Secrecy-based channel assignment for device-to-device communication:an auction approach[A].IEEE International Conference on Wireless Communications & Signal Processing[C].Hangzhou:IEEE,2013.1-6.
[11] Yue J,Ma C,Yu H.Secrecy-based access control for device-to-device communication cnderlaying cellular networks[J].IEEE Transactions on Communications Letters,IEEE,2013,17(11):2068-2071.
[12] Zhu D,Swindlehurst A L,Fakoorian S A A.Device-to-device communications:the physical layer security advantage[A].IEEE International Conference on Acoustics,Speech and Signal Processing[C].Florence:IEEE,2014.1606-1610.
[13] Zhang H,Wang T,Song L.Radio resource allocation for physical-layer security in D2D underlay communications[A].IEEE International Conference on Communications[C].Sydney:IEEE,2014.2319-2324.
[14] Yu X,Jing Y.SVD-based channel estimation for MIMO relay networks[A].IEEE International Conference on Vehicular Technology Conference[C].Québec City:IEEE,2012.1-5.
[15] Li L,Wang J,Wu X.ZF beamforming performance analysis for multiuser spatial multiplexing with imperfect channel feedback[A].IEEE International Conference on Wireless Communications,Networking and Mobile Computing[C].Shanghai:IEEE,2007.869-872.
[16] Goel S,Negi R.Guaranteeing secrecy using artificial noise[J].IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
[17] Li J,Petropulu A P.On ergodic secrecy rate for gaussian MISO wiretap channels[J].IEEE Transactions on Wireless Communications,2011,10(4):1176-1187. |