On cooperative and malicious behaviors in multirelay fading channels
dc.contributor.author | Chen, Meng-Hsi | en_AU |
dc.contributor.author | Lin, Shih-Chun | en_AU |
dc.contributor.author | Hong, Y.-W. Peter | en_AU |
dc.contributor.author | Zhou, Xiangyun | en_AU |
dc.date.accessioned | 2015-12-13T22:24:52Z | |
dc.date.created | 2013 | en_AU |
dc.date.updated | 2016-02-24T09:12:32Z | |
dc.description.abstract | Multirelay networks exploit spatial diversity by transmitting user's messages through multiple relay paths. Most works in the literature on cooperative or relay networks assume that all terminals are fully cooperative and neglect the effect of possibly ex | en_AU |
dc.format.mimetype | application/pdf | en_AU |
dc.identifier.issn | 1556-6021 | en_AU |
dc.identifier.uri | http://hdl.handle.net/1885/72953 | |
dc.language.iso | en_AU | en_AU |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_AU |
dc.source | IEEE Transactions on Information Forensics and Security | en_AU |
dc.subject | Keywords: CSI; Malicious behavior; malicious relay; Mutual information game; Mutual informations; Optimal attack strategies; Optimal transmission strategy; Transmission phase; Cooperative communication; Fading channels; Game theory; Information theory; Jamming; Opt Cooperative communications; CSI; game theory; jamming; malicious relay; mutual information | en_AU |
dc.title | On cooperative and malicious behaviors in multirelay fading channels | en_AU |
dc.type | Journal article | en_AU |
local.bibliographicCitation.issue | 7 | |
local.bibliographicCitation.lastpage | 1139 | |
local.bibliographicCitation.startpage | 1126 | |
local.contributor.affiliation | Chen, Meng-Hsi, National Tsing-Hua University | en_AU |
local.contributor.affiliation | Lin, Shih-Chun, National Taiwan University of Science and Technology | en_AU |
local.contributor.affiliation | Hong, Y.-W. Peter, National Tsing Hua University | en_AU |
local.contributor.affiliation | Zhou, Xiangyun (Sean), College of Engineering and Computer Science, ANU | en_AU |
local.contributor.authoremail | u2586105@anu.edu.au | en_AU |
local.contributor.authoruid | Zhou, Xiangyun (Sean), u2586105 | en_AU |
local.description.embargo | 2037-12-31 | |
local.description.notes | Imported from ARIES | |
local.identifier.absfor | 100503 - Computer Communications Networks | |
local.identifier.ariespublication | f5625xPUB3499 | |
local.identifier.citationvolume | 8 | |
local.identifier.doi | 10.1109/TIFS.2013.2262941 | en_AU |
local.identifier.scopusID | 2-s2.0-84878833098 | |
local.identifier.thomsonID | 000320866600005 | |
local.identifier.uidSubmittedBy | f5625 | en_AU |
local.type.status | Published Version | en_AU |
Downloads
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 01_Chen_On_cooperative_and_malicious_2013.pdf
- Size:
- 3.85 MB
- Format:
- Adobe Portable Document Format