-
1
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and A. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.2
-
3
-
-
34548337304
-
Measurement-based self organization of interfering 802.11 wireless access networks
-
Alaska, USA, May
-
B. Kauffmann, F. Baccelli, A. Chaintreau, V. Mhatre, K. Papagiannaki, and C. Diot, "Measurement-based self organization of interfering 802.11 wireless access networks," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), Alaska, USA, May 2007.
-
(2007)
Proc. IEEE Conf. Comput. Commun. (INFOCOM)
-
-
Kauffmann, B.1
Baccelli, F.2
Chaintreau, A.3
Mhatre, V.4
Papagiannaki, K.5
Diot, C.6
-
4
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
5
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
6
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.2
-
7
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inform. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inform. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
8
-
-
0038236418
-
Capacity limits of MIMO channels
-
Jun
-
A. Goldsmith, S. A. Jafar, N. Jindal, and S. Vishwanath, "Capacity limits of MIMO channels," IEEE J. Sel. Areas Commun., vol. 21, no. 5, pp. 684-702, Jun. 2003.
-
(2003)
IEEE J. Sel. Areas Commun
, vol.21
, Issue.5
, pp. 684-702
-
-
Goldsmith, A.1
Jafar, S.A.2
Jindal, N.3
Vishwanath, S.4
-
9
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
10
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L. C. Choo, and K. K.Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.C.2
Wong, K.K.3
-
12
-
-
77953826156
-
Cooperative jamming in MIMO ad-hoc networks
-
Monterey, CA, USA Nov
-
J. Wang and A. L. Swindlehurst, "Cooperative jamming in MIMO ad-hoc networks," in Proc. 43rd Asilomar Conf. on Signals, Syst. and Comput., Monterey, CA, USA, Nov. 2009, pp. 1719-1723.
-
(2009)
Proc. 43rd Asilomar Conf. on Signals, Syst. and Comput.
, pp. 1719-1723
-
-
Wang, J.1
Swindlehurst, A.L.2
-
13
-
-
79957465600
-
Wireless secrecy regions with friendly jamming
-
Jun.
-
J. Vilela, M. Bloch, J. Barros, and S. McLaughlin, "Wireless secrecy regions with friendly jamming," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 256-266, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 256-266
-
-
Vilela, J.1
Bloch, M.2
Barros, J.3
McLaughlin, S.4
-
14
-
-
80051727482
-
Strongly secure communications over the two-way wiretap channel
-
Sep.
-
A. Pierrot and M. Bloch, "Strongly secure communications over the two-way wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 595-605, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 595-605
-
-
Pierrot, A.1
Bloch, M.2
-
15
-
-
84866730731
-
Energy efficiency of cooperative jamming strategies in secure wireless networks
-
Sep.
-
M. Dehghan, D. Goeckel,M. Ghaderi, and Z. Ding, "Energy efficiency of cooperative jamming strategies in secure wireless networks," IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sep. 2012.
-
(2012)
IEEE Trans. Wireless Commun
, vol.11
, Issue.9
, pp. 3025-3029
-
-
Dehghan, M.1
Goeckel, D.2
Ghaderi, M.3
Ding, Z.4
-
16
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
-
Jan.
-
H.-M.Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
17
-
-
84857722105
-
Ergodic secret alignment
-
Mar.
-
R. Bassily and S. Ulukus, "Ergodic secret alignment," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1594-1611, Mar. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.3
, pp. 1594-1611
-
-
Bassily, R.1
Ulukus, S.2
-
18
-
-
80051779980
-
Secure communications over wireless broadcast networks: Stability and utility maximization
-
Sep.
-
Y. Liang, H. V. Poor, and L. Ying, "Secure communications over wireless broadcast networks: Stability and utility maximization," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 682-692, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 682-692
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
19
-
-
80051757223
-
Position-based jamming for enhanced wireless secrecy
-
Sep.
-
J.Vilela, P. Pinto, and J. Barros, "Position-based jamming for enhanced wireless secrecy," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 616-627, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 616-627
-
-
Vilela, J.1
Pinto, P.2
Barros, J.3
-
20
-
-
84978483855
-
Secrecy rate region of MISO interference channel: Pareto boundary and non-cooperative games
-
Berlin, Germany Feb
-
E. A. Jorswieck and R. Mochaourab, "Secrecy rate region of MISO interference channel: Pareto boundary and non-cooperative games," in Proc. Int. ITG Wkshp on Smart Antennas (WSA), Berlin, Germany, Feb. 2009.
-
(2009)
Proc. Int. ITG Wkshp on Smart Antennas (WSA)
-
-
Jorswieck, E.A.1
Mochaourab, R.2
-
21
-
-
77953802876
-
Secure transmission with multiple antennas I: TheMISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: TheMISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
22
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Nice, France, Jun
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," inProc. IEEE Int. Symp. Inform. Theory (ISIT), Nice, France, Jun. 2007, pp. 2466-2470.
-
(2007)
Proc. IEEE Int. Symp. Inform. Theory (ISIT)
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
23
-
-
77949945136
-
Improved wireless secrecy rate using distributed auction theory
-
Wu Yi Mountain, China Dec
-
Z. Han, N. Marina, M. Debbah, and A. Hjorungnes, "Improved wireless secrecy rate using distributed auction theory," in Proc. Int. Conf. Mobile Ad-Hoc and Sensor Networks, Wu Yi Mountain, China, Dec. 2009, pp. 442-447.
-
(2009)
Proc. Int. Conf. Mobile Ad-Hoc and Sensor Networks
, pp. 442-447
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjorungnes, A.4
-
24
-
-
79960596603
-
Improve physical layer security in cooperative wireless network using distributed auction games
-
Shanghai, China, Apr
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Improve physical layer security in cooperative wireless network using distributed auction games," in Proc. IEEE Conf. Comput. Commun. Wkshps (INFOCOM WORKSHOPS), Shanghai, China, Apr. 2011, pp. 18-23.
-
(2011)
Proc. IEEE Conf. Comput. Commun. Wkshps (INFOCOM WORKSHOPS)
, pp. 18-23
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
25
-
-
70349991516
-
Physical layer security game: How to date a girl with her boyfriend on the same table
-
Istanbul, Turkey May
-
Z. Han, N. Marina, M. Debbah, and A. Hjorungnes, "Physical layer security game: How to date a girl with her boyfriend on the same table," in Proc. Int. Conf. Game Theory for Networks, Istanbul, Turkey, May 2009, pp. 287-294.
-
(2009)
Proc. Int. Conf. Game Theory for Networks
, pp. 287-294
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjorungnes, A.4
-
26
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper and friendly jammer
-
Article ID 452907
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: Interaction between source, eavesdropper and friendly jammer," EURASIP J. Wireless Commun. Netw., vol. 54, no. 8, pp. 1355-1387, 2009, Article ID 452907.
-
(2009)
EURASIP J. Wireless Commun. Netw
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
27
-
-
84864360310
-
Distributed stable matching algorithm for physical layer security with multiple source-destination pairs and jammer nodes
-
Paris, France, Apr
-
S. Bayat, R. Y. H. Louie, Z. Han, Y. Li, and B. Vucetic, "Distributed stable matching algorithm for physical layer security with multiple source-destination pairs and jammer nodes," in Proc. IEEE Wireless Commun. and Network. Conf. (WCNC), Paris, France, Apr. 2012, pp. 2466-2470.
-
(2012)
Proc. IEEE Wireless Commun. and Network. Conf. (WCNC)
, pp. 2466-2470
-
-
Bayat, S.1
Louie, R.Y.H.2
Han, Z.3
Li, Y.4
Vucetic, B.5
-
29
-
-
84902634329
-
-
2nd ed. Amsterdam The Netherlands: Elsevier
-
V. Krishna, Auction Theory, 2nd ed. Amsterdam, The Netherlands: Elsevier, 2010.
-
(2010)
Auction Theory
-
-
Krishna, V.1
-
30
-
-
61349158726
-
Connectivity-aware network maintenance and repair via relays deployment
-
Jan
-
A. Ibrahim, K. Seddik, and K. Liu, "Connectivity-aware network maintenance and repair via relays deployment," IEEE Trans. Wireless Commun., vol. 8, no. 1, pp. 356-366, Jan. 2009.
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.1
, pp. 356-366
-
-
Ibrahim, A.1
Seddik, K.2
Liu, K.3
-
31
-
-
61349120242
-
Performance bounds for two-way amplify-and-forward relaying
-
Jan
-
Y. Han, S. H. Ting, C. K. Ho, and W. H. Chin, "Performance bounds for two-way amplify-and-forward relaying," IEEE Trans. Wireless Commun., vol. 8, no. 1, pp. 432-439, Jan. 2009.
-
(2009)
IEEE Trans. Wireless Commun
, vol.8
, Issue.1
, pp. 432-439
-
-
Han, Y.1
Ting, S.H.2
Ho, C.K.3
Chin, W.H.4
-
33
-
-
33746888250
-
A fluid analysis of a utility-based wireless scheduling policy
-
DOI 10.1109/TIT.2006.876246
-
P. Liu, R. Berry, and M. Honig, "A fluid analysis of a utility-based wireless scheduling policy," IEEE Trans. Inf. Theory, vol. 52, no. 7, pp. 2872-2889, Jul. 2006. (Pubitemid 44192958)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.7
, pp. 2872-2889
-
-
Liu, P.1
Berry, R.A.2
Honig, M.L.3
-
34
-
-
17144419393
-
Max-utility wireless resource management for best-effort traffic
-
DOI 10.1109/TWC.2004.840210
-
Z. Jiang, Y. Ge, and Y. Li, "Max-utility wireless resource management for best-effort traffic," IEEE Trans.Wireless Commun., vol. 4, no. 1, pp. 100-111, Jan. 2005. (Pubitemid 40748812)
-
(2005)
IEEE Transactions on Wireless Communications
, vol.4
, Issue.1
, pp. 100-111
-
-
Jiang, Z.1
Ge, Y.2
Li, Y.3
-
35
-
-
33646400005
-
Price-based distributed algorithms for rate-reliability tradeoff in network utility maximization
-
May
-
J. W. Lee, M. Chiang, and A. Calderbank, "Price-based distributed algorithms for rate-reliability tradeoff in network utility maximization," IEEE J. Sel. Areas Commun., vol. 24, no. 5, pp. 962-976, May 2006.
-
(2006)
IEEE J. Sel. Areas Commun
, vol.24
, Issue.5
, pp. 962-976
-
-
Lee, J.W.1
Chiang, M.2
Calderbank, A.3
-
37
-
-
0003498504
-
-
4th ed. San Diego, CA, USA: Academic: Elsevier
-
I. S. Gradshteyn and I.M. Ryzhik, Table of Integrals, Series, and Products, 4th ed. San Diego, CA, USA: Academic: Elsevier, 2007.
-
(2007)
Table of Integrals, Series, and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
38
-
-
0031996910
-
Channel estimation for OFDM systems based on comb-type pilot arrangement in frequency selective fading channels
-
Feb
-
H. Meng-Han and W. Che-Ho, "Channel estimation for OFDM systems based on comb-type pilot arrangement in frequency selective fading channels," IEEE Trans. Consumer Electron., vol. 44, no. 1, pp. 217-225, Feb. 1998.
-
(1998)
IEEE Trans. Consumer Electron
, vol.44
, Issue.1
, pp. 217-225
-
-
Meng-Han, H.1
Che-Ho, W.2
-
39
-
-
0036685434
-
Pilot-based estimation of time-varying multipath channels for coherent CDMA receivers
-
Aug
-
M. A. R. Baissas and A. M. Sayeed, "Pilot-based estimation of time-varying multipath channels for coherent CDMA receivers," IEEE Trans. Signal Process., vol. 50, no. 8, pp. 2037-2049, Aug. 2002.
-
(2002)
IEEE Trans. Signal Process
, vol.50
, Issue.8
, pp. 2037-2049
-
-
Baissas, M.A.R.1
Sayeed, A.M.2
-
44
-
-
80054054586
-
-
M.Sc., Texas Tech. Univ., Math. Dept., Lubbock, TX
-
R. J. Pavur, "Quadratic Forms Involving the Complex Gaussian," M.Sc., Texas Tech. Univ., Math. Dept., Lubbock, TX, 1980 [Online]. Available: http://esr.lib.ttu.edu/bitstream/handle/2346/15078/31295002439585.pdf
-
(1980)
Quadratic Forms Involving the Complex Gaussian
-
-
Pavur, R.J.1
-
45
-
-
77949704990
-
Maximum sumrate ofMIMO multiuser scheduling with linear receivers
-
Nov
-
R. H. Y. Louie, M. R. McKay, and I. B. Collings, "Maximum sumrate ofMIMO multiuser scheduling with linear receivers," IEEE Trans. Commun., vol. 57, no. 11, pp. 3500-3510, Nov. 2009.
-
(2009)
IEEE Trans. Commun
, vol.57
, Issue.11
, pp. 3500-3510
-
-
Louie, R.H.Y.1
McKay, M.R.2
Collings, I.B.3
-
47
-
-
84890459573
-
The complexity of linear programming
-
A. Kan and J. Telgen, "The complexity of linear programming," J. Statistica Neerlandica, no. 2, pp. 91-107, 1981.
-
(1981)
J. Statistica Neerlandica
, Issue.2
, pp. 91-107
-
-
Kan, A.1
Telgen, J.2
|