2018
DOI: 10.1109/tvt.2018.2800051
|View full text |Cite
|
Sign up to set email alerts
|

Game-Theoretic Power Control Mechanisms for Device-to-Device Communications Underlaying Cellular System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(11 citation statements)
references
References 35 publications
0
11
0
Order By: Relevance
“…Then joint considering the constraints of α in (5e) (34) (39), we can obtained the feasible domain of α as follows 3 4 , After deriving the feasible domain of α, by substituting (28) and (29) into 7, we can derived another expression of the objective function of (…”
Section: T C Li B B C Li B T T C a B B T A T C B B T C T C Li B B C Lmentioning
confidence: 99%
See 1 more Smart Citation
“…Then joint considering the constraints of α in (5e) (34) (39), we can obtained the feasible domain of α as follows 3 4 , After deriving the feasible domain of α, by substituting (28) and (29) into 7, we can derived another expression of the objective function of (…”
Section: T C Li B B C Li B T T C a B B T A T C B B T C T C Li B B C Lmentioning
confidence: 99%
“…D2D communications enable two adjacent users can communicate with each other, thus can provide flexible mobile local service, and offload the heavy traffic of base station [3]- [4]. By D2D communication, one mobile user can be directly served by one nearby user who stores his requested contents, instead of by the base station.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the previous literature [3][4][5][6][7][8][9][10][11][12] is based on the hypothesis of perfect channel state information (CSI). While in practice, CSI is difficult to be perfectly known at each base station (BS) due to the channel estimation and quantization errors.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…During the past decades, a framework of using PLS to ensure secure communication in dense HCNs has been developed in [3], and security performance without considering interference has been promoted in [4]. On this basis, researchers have designed many methods such as multiple-input multiple-output (MIMO) [5], secrecy beamforming [6], artificial noise (AN) [7], cooperative transmission [8], cooperative jamming [9] and resource allocation [10][11][12] to improve the security performance of wireless systems.…”
Section: Introductionmentioning
confidence: 99%
“…Radio-frequency (RF) energy harvesting is a technology which can harvest energy from RF signals to power communication devices in energy constrained wireless network, such as Internet of Things (IoT) networks [17] [18], low-power cognitive radio networks [19]- [21], and device-to-device networks [22]- [24]. In particular, simultaneous wireless information and power transfer (SWIPT) is a RF energy harvesting technology that can harvest energy and decode information from the same signal [25] [26].…”
Section: Introductionmentioning
confidence: 99%