[1] GE X H,CHEN J Q,WANG C X,et al.5G green cellular networks considering power allocation schemes[J].Science China Information Sciences,2016,59(2):1-14.
[2] Ding Z G,Liu Y W,Choi J H,et al.Application ofnon-orthogonal multiple access in LTE and 5G networks[J].IEEE Communications Magazine,2017,55(2):185-191.
[3] Laneman J N,Tse D N C,Wornell G W,et al.Cooperativediversity in wireless networks:efficient protocols and outage behavior[J].IEEE Transactions on Information Theory,2004,50(12):3062-3080.
[4] Choi J.Non-orthogonalmultiple access in downlink coordinated two point systems[J].IEEE Communications Letters,2014,18(2):313-316.
[5] Ding Z,Peng M,Poor H V.Cooperativenon-orthogonal multiple access in 5G systems point systems[J].IEEE Communications Letters,2015,19(8):1462-1465.
[6] Ding Z,Dai H,Poor H V.Relay selection for cooperative NOMA[J].IEEE Wireless Communications Letters,2016,5(4):416-419.
[7] Men J,Ge J.Non-orthogonal multiple access for multiple-antenna relaying networks[J].IEEE Wireless Communications Letters,2015,19(10):1686-1689.
[8] Zhong C,Zhang Z.Non-orthogonal multiple access with cooperative full-duplex relaying[J].IEEE Communications Letters,2016,20(12):2478-2481.
[9] Zhang L,Liu J Q,Xiao M,et al.Performance analysis and optimization in downlink NOMA systems with cooperative full-duplex relaying[J].IEEE Journal on Selected Areas in Communications,2017,35(10):2398-2412.
[10] Mukherjee A,Fakoorian S A A,J Huang,et al.Principles of physical layer security in multiuser wireless networks:a survey[J].IEEE Communications Surveys & Tutorials,2014,16(3):1550-1573.
[11] Dai B,Ma Z.Multiple-accessrelay wiretap channel[J].IEEE Transactions on Information Forensics and Security,2014,10(9):1835-1849.
[12] Zou Y,Wang X,Shen W.Optimalrelay selection for physical-layer security in cooperative wireless networks[J].IEEE Journal on Selected Areas in Communications,2013,31(10):2099-2111.
[13] Zou Y,Wang X,Shen W.Security versus reliability analysis of opportunistic relaying[J].IEEE Transactions on Vehicular Technology,2014,63(6):2653-2661.
[14] Zou Y,Zhu J,Wang X,et al.Improving physical-layer security in wireless communications using diversity techniques[J].IEEE Network,2014,29(1):42-48.
[15] Zhang Y,Wang H M.Secrecy sum rate maximization in non-orthogonal multiple access[J].IEEE Communications Letters,2016,20(5):930-933.
[16] Li Y,Jiang M,Zhang Q,et al.Secure beamforming in downlink MISO non-orthogonal multiple access systems[J].IEEE Transactions on Vehicular Technology,2017,66(8):7563-7567.
[17] He B,Liu A,Yang.On the design of secure non-orthogonal multiple access systems[J].IEEE Journal on Selected Areas in Communications,2017,35(10):2196-2206.
[18] Liu Y,Qin Z,Elkashlan M,et al.Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks[J].IEEE Transactions on Wireless Communications,2017,16(3):1656-1672.
[19] Zhang Z Q,Ma Z,Xiao M,et al.Full-duplex device-to-device aided cooperative non-orthogonal multiple access[J].IEEE Transactions on Vehicular Technology,2017,66(5):4467-4471.
[20] Phan K T,Le-Ngoc T.Power allocation for buffer-aided full-duplex relaying with imperfect self-interference cancelation and statistical delay constraint[J].IEEE Access,2016,4:3961-3974.
[21] DoT P and Yun H K.Resource allocation for a full-duplex wireless-powered communication network with imperfect self-interference cancelation[J].IEEE Communications Letters,2016,20(12):2482-2485.
[22] Hildebrand F B.Introduction to Numerical Analysis[M].London:McGraw-Hill,1974. |