Login / Signup
Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective.
Chuan Ma
Jiaqi Liu
Xiaohua Tian
Hui Yu
Ying Cui
Xinbing Wang
Published in:
IEEE Trans. Commun. (2015)
Keyphrases
</>
cellular networks
channel assignment
long term evolution
wireless networks
traffic management
mobile users
base station
mobile networks
cellular systems
wifi
rfid tags
wireless mesh networks
supply chain management
metadata
call admission control
multipath
mobile devices