Abstract | ||
---|---|---|
We consider an amplify-and-forward relay network composed of a source, two relays, and a destination. In this network, the two relays are untrusted in the sense that they may perform Byzantine attacks by forwarding altered symbols to the destination. Note that every symbol received by the destination may be altered, and hence, no clean reference observation is available to the destination. For thi... |
Year | DOI | Venue |
---|---|---|
2016 | 10.1109/TIFS.2016.2596140 | IEEE Transactions on Information Forensics and Security |
Keywords | DocType | Volume |
Cryptography,Relay networks (telecommunications),Random variables,Physical layer,Stochastic processes,Indexing | Journal | 11 |
Issue | ISSN | Citations |
12 | 1556-6013 | 3 |
PageRank | References | Authors |
0.43 | 13 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ruohan Cao | 1 | 29 | 10.09 |
Tan F. Wong | 2 | 472 | 45.61 |
Tiejun Lv | 3 | 669 | 97.19 |
Hui Gao | 4 | 175 | 30.27 |
Shaoshi Yang | 5 | 49 | 2.94 |