2018
DOI: 10.1109/lcomm.2018.2808963
|View full text |Cite
|
Sign up to set email alerts
|

Transmit-Power Minimization for NOMA-Enabled Traffic Offloading With Security Provisioning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…In the work of [19], the eavesdropper's interception capability has been overestimated, while, in this paper, we extend this assumption to a more general case that the eavesdroppers are regarded as ordinary users, which owe no decoding ability [24,25]. Hence, the received SINR of x 1 at the m-th Eve can be given by ζ e,m = P a a 1 h ae,m w s…”
Section: System Modelmentioning
confidence: 99%
“…In the work of [19], the eavesdropper's interception capability has been overestimated, while, in this paper, we extend this assumption to a more general case that the eavesdroppers are regarded as ordinary users, which owe no decoding ability [24,25]. Hence, the received SINR of x 1 at the m-th Eve can be given by ζ e,m = P a a 1 h ae,m w s…”
Section: System Modelmentioning
confidence: 99%
“…Works [11][12][13][14][15][16]23,24] investigate the traffic offloading problem in HetNets. In [12], the authors optimise traffic offloading from macro cells to small cells using a Markov approximation and game-theoretic approaches.…”
Section: Related Workmentioning
confidence: 99%
“…The works in [23,24] focus on power control. Compared to [23,24], we jointly optimise user pairing, power control and RU allocation. More importantly, we consider the coupling of resource allocation and inter-cell interference.…”
Section: Contributionsmentioning
confidence: 99%
See 2 more Smart Citations