[1] |
TANG W , FENG S , DING Y ,et al. Physical layer security in heterogeneous networks with jammer selection and full-duplex users[J]. IEEE Transactions on Wireless Communications, 2017,16(12): 7982-7995.
|
[2] |
LEE J , QUEK T Q S . Hybrid full-/half-duplex system analysis in heterogeneous wireless networks[J]. IEEE Transactions on Wireless Communications, 2015,14(5): 2883-2895.
|
[3] |
WAND H M , ZHENG T X , YUAN J ,et al. Physical layer security in heterogeneous cellular networks[J]. IEEE Transactions on Communications, 2016,64(3): 1204-1219.
|
[4] |
LI B , FEI Z , CHEN H . Robust artificial noise-aided secure beamforming in wireless-powered non-regenerative relay networks[J]. IEEE Access, 2016,4: 7921-7929.
|
[5] |
RENZO M D , GUAN P . Stochastic geometry modeling and system-level analysis of uplink heterogeneous cellular networks with multi-antenna base stations[J]. IEEE Transactions on Communications, 2016,64(6): 2453-2476.
|
[6] |
XU M , TAO X , YANG F ,et al. Enhancing secured coverage with CoMP transmission in heterogeneous cellular networks[J]. IEEE Communications Letters, 2016,20(11): 2272-2275.
|
[7] |
ZHANG L , LIU J , XIAO M ,et al. Performance analysis and optimization in downlink NOMA systems with cooperative full-duplex relaying[J]. IEEE Journal on Selected Areas in Communications, 2017,35(10): 2398-2412.
|
[8] |
WANG J , YU H , WU Y ,et al. Pilot optimization and power allocation for OFDM-based full-duplex relay networks with IQ-imbalances[J]. IEEE Access, 2017(5): 24344-24352.
|
[9] |
ZHAO L , WANG X , RIIHONEN T . Transmission rate optimization of full-duplex relay systems powered by wireless energy transfer[J]. IEEE Transactions on Wireless Communications, 2017,16(10): 6438-6450.
|
[10] |
SHAFIE A E , SULTAN A , AL-DHAHIR N . Physical-layer security of a buffer-aided full-duplex relaying system[J]. IEEE Communications Letters, 2016,20(9): 1856-1859.
|
[11] |
CHEN G , GONG Y , XIAO P ,et al. Physical layer network security in the full-duplex relay system[J]. IEEE Transactions Information Forensics Security, 2015,10(3): 574-583.
|
[12] |
NGUYEN N P , KUNDU C , NGO H Q ,et al. Secure full-duplex small-cell networks in a spectrum sharing environment[J]. IEEE Access, 2016,4: 3087-3099.
|
[13] |
LI L , HESHAML G . The relay-eavesdropper channel:cooperation for secrey[J]. IEEE Transactions on Information Theory, 2008,54(9): 4005-4019.
|
[14] |
DHILLON H S , KOUNTOURIS M , ANDREWS J G . Downlink MIMO HetNets:modeling,ordering results and performance analysis[J]. IEEE Transactions on Wireless Communications, 2013,12(10): 5208-5222.
|
[15] |
ZHANG T , HUANG Y , CAI Y ,et al. Secure transmission in spectrum sharing relaying networks with multiple antennas[J]. IEEE Communications Letters, 2016,20(4): 824-827.
|
[16] |
GUPTA A K , DHILLON H S , VISHWANATH S ,et al. Downlink coverage probability in MIMO HetNets with flexible cell selection[C]// Global Communication Conference. IEEE, 2014: 1534-1539.
|
[17] |
DENG Y , WANG L , ZAIDI S A R ,et al. Artificial-noise aided secure transmission in large scale spectrum sharing networks[J]. IEEE Transactions on Communications, 2016,64(5): 2116-2129.
|