Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 41 publications
0
29
0
Order By: Relevance
“…Secrecy beamforming schemes were proposed for MISO-NOMA systems, cognitive MISO-NOMA systems, and MIMO-NOMA systems in [32], [33], [34], and [35], respectively. The secrecy performance of a NOMA system with multiple eavesdroppers was investigated while zero-forcing and minimum mean-square error decoding schemes were utilized on the legitimate destinations in [36]. A new joint subcarrier (SC) assignment and PA scheme was proposed to improve the security of the two-way relay NOMA systems in [37].…”
Section: A Background and Related Workmentioning
confidence: 99%
“…Secrecy beamforming schemes were proposed for MISO-NOMA systems, cognitive MISO-NOMA systems, and MIMO-NOMA systems in [32], [33], [34], and [35], respectively. The secrecy performance of a NOMA system with multiple eavesdroppers was investigated while zero-forcing and minimum mean-square error decoding schemes were utilized on the legitimate destinations in [36]. A new joint subcarrier (SC) assignment and PA scheme was proposed to improve the security of the two-way relay NOMA systems in [37].…”
Section: A Background and Related Workmentioning
confidence: 99%
“…Referring to (7) and (11), we can get a combination formula of the SINR of the NOMA-based D2D enhanced cellular network.…”
Section: System Formulationmentioning
confidence: 99%
“…In [10], a method for predefining a minimum transmission rate for each user to guarantee QoS is focused on. In [11,12], a new secrecy transmission paradigm and an advanced resource allocation algorithm for uplink and downlink NOMA systems are proposed respectively. The energy efficiency (EE) is studied in a NOMA enabled heterogeneous cloud radio access network (H-CRAN) in [13] in which key technologies in 5G network are discussed to be properly implemented that can be applied in NOMA H-CRANs to improve EE.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the openness of transmission environments and the broadcast nature of wireless channels, secure transmission has becoming a critical issue in wireless networks [11,12]. Since eavesdroppers will make every effort to intercept or break the information transmission, many scholars have conducted in-depth research on how to protect the transmission of confidential information.…”
Section: Introductionmentioning
confidence: 99%