[1] |
CISCO.Cisco visual networking index:global mobile data traffic forecast update[EB/OL].[2018-06-17].https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-738429.html.
|
[2] |
HU Haonan,ZHANG Baoling,HONG Qi,et al.Coverage analysis of reduced power subframes applied in heterogeneous networks with subframe misalignment interference[J].IEEE Wireless Communications Letters,2018,7(5):752-755.
|
[3] |
KAMEL M,HAMOUDA W,YOUSSEF A.Ultra-dense networks:a survey[J].IEEE Communications Surveys and Tutorials,2016,18(4):2522-2545.
|
[4] |
CHEN Xianfu,WU Jinsong,CAI Yueming,et al.Energy-efficiency oriented traffic offloading in wireless networks:a brief survey and a learning approach for heterogeneous cellular networks[J].IEEE Journal on Selected Areas in Communications,2015,33(4):627-640.
|
[5] |
ANDREWS J,BUZZI S,CHOI W,et al.What will 5G be?[J].IEEE Journal on Selected Areas in Communica-tions,2014,32(6):1065-1082.
|
[6] |
LIU Dantong,WANG Lifeng,CHEN Yue,et al.User association in 5G networks:a survey and an outlook[J].IEEE Communications Surveys and Tutorials,2015,18(2):1018-1044.
|
[7] |
纪珊珊,贾向东,徐文娟.中继协作异构网用户对级联方案及安全概率分析[J].信号处理,2018,34(6):697-706.
|
[8] |
WU Yongpeng,SCHOBER R,NG D,et al.Secure massive MIMO transmission with an active eavesdropper[J].IEEE Transactions on Information Theory,2016,62(7):3880-3900.
|
[9] |
SCHNEIER B.Cryptographic design vulnerabilities[J].Computer,1998,31(9):29-33.
|
[10] |
颉满刚,贾向东,周猛.大规模MIMO蜂窝网与D2D混合网络物理层安全性能研究[J].重庆邮电大学学报(自然科学版),2017,29(1):19-28.
|
[11] |
颉满刚,贾向东,周猛.基于大规模MIMO和D2D技术的混合网络能量效率研究[J].信号处理,2017,33(1):53-61.
|
[12] |
MA Chuan,LIU Jiaqi,TIAN Xiaohua,et al.Interference exploitation in D2D-enabled cellular networks:a secrecy perspective[J].IEEE Transactions on Communications,2015,63(1):229-242.
|
[13] |
CAO Dongxu,ZHOU Sheng,NIU Zhisheng.Optimal combination of base station densities for energy-efficient two-tier heterogeneous cellular networks[J].IEEE Transactions on Wireless Communications,2013,12(9):4350-4362.
|
[14] |
JIA Xiangdong,JI Shanshan,OUYANG Yuhua,et al.Non-best user association scheme and effect on multiple tiers heterogeneous networks[J].IET Communications,2018,12(17):2067-2075.
|
[15] |
GRADSHTEYN I,RYZHIK I.Table of integrals,series,and products[M].Burlington,USA:Academic Press,2007.
|