[1]A. Kuhestani, A. Mohammadi, and P. L. Yeoh, "Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying Networks with an External Jammer," IEEE Transactions on Communications, vol. 66, no. 6, pp. 2671-2684, 2018.
[2]A. Kuhestani and A. Mohammadi, "Destination-based Cooperative Jamming in Untrusted Amplify-and-Forward Relay Networks: Resource Allocation and Performance Study," IET Communications, vol. 10, no. 1, pp. 17-23, Jan. 2016.
[3]A. Asadi, Q. Wang, and V. Mancuso, "A Survey on Device-to-Device Communication in Cellular Networks," IEEE Communications Surveys & Tutorials, vol. 16, pp. 1801-1819, 2014.
[4]O. N. Hamoud, T. Kenaza, and Y. Challal, "Security in Device-to-Device Communications: A Survey," IET Networks, vol. 7, no. 1, pp. 14-22, Jan. 2018.
[5]Y. Zhang, Y. Shen, X. Jiang, and S. Kasahara, "Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective," IEEE Transactions on Communications, Feb. 2018.
[6]Y. Yang, Y. Zhang, L. Dai, J. Li, S. Mumtaz, and J. Rodriguez, "Transmission Capacity Analysis of Relay-Assisted Device-to-Device Overlay/Underlay Communication," IEEE Transactions on Industrial Informatics, vol. 13, pp. 380-389, 2017.
[7]S. N. Islam, M. A. Mahmud, and A. M. T. Oo, "Achievable Sum Rate Analysis of Relay Aided Overlay Device to Device Communication Among Multiple Devices," Journal of Communications and Networks, vol. 19, pp. 309-318, 2017.
[8]M. Izanlou, A. Mohammadi, and M. Dosaranian-Moghadam, “Optimal Power Allocation for Physical Layer Security in Device-to-Device Communications using Untrusted Relays,” Transactions on Emerging Telecommunications Technologies, https://doi.org/10.1002/ett.3623, 26 Apr. 2019.
[9] D. Chen,L. Wang,T. Yin, X. Xu, W. Yang,Y. Cai, and W. Yang, "Reliability and Security Performance Analysis of Non-Regenerative Untrusted Relay Networks," 2015 International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, pp. 1-5, 2015.
[10] J. Zhu, Y. Zou, B. Champagne, W. Zhu and L. Hanzo, "Security–Reliability Tradeoff Analysis of Multirelay-Aided Decode-and-Forward Cooperation Systems," IEEE Transactions on Vehicular Technology, vol. 65, no. 7, pp. 5825-5831, July 2016.
[11] A. Kuhestani, A. Mohammadi and P. L. Yeoh, "Security-Reliability Trade-off in Cyber-Physical Cooperative Systems with Non-Ideal Untrusted Relaying," 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, pp. 552-557, 2018.
[12 M. T. Mamaghani and R. Abbas, "Security and Reliability Performance Analysis for Two-Way Wireless Energy Harvesting based Untrusted Relaying with Cooperative Jamming," IET Communications, vol. 13, no. 4, pp. 449-459, 2019.
[13] J. Zhu, Z. Liu, Y. Jiang and Y. Zou, "Security-Reliability Tradeoff for Relay Selection in Cooperative Amplify-and-Forward Relay Networks," 2015 International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, 2015, pp. 1-4, 2015.
[14] Y. Zou, X. Wang, W. Shen and L. Hanzo, "Security Versus Reliability Analysis of Opportunistic Relaying," IEEE Transactions on Vehicular Technology, vol. 63, no. 6, pp. 2653-2661, July 2014.
[15]C. Zhang, J. Ge, F.Gong, F. Jia, and N. Guo, "Security-Reliability Tradeoff for Untrusted and Selfish Relay-Assisted D2D Communications in Heterogeneous Cellular Networks for IoT," IEEE Systems Journal, pp. 1-10, 11 Sept 2019.
[16]I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York: Academic, 2007.
[18]T.-X. Zheng, H.-M. Wang, H. Deng, "Improving Anti-Eavesdropping Ability without Eavesdropper’s CSI: A Practical Secure Transmission Design Perspective,"
IEEE Wireless Communications Letters, vol. 7, no. 6, pp. 946 - 949, Dec. 2018.