-
1
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0347337828
-
Secure space-time communication
-
Dec
-
A. O. Hero, "Secure space-time communication," IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235-3249, Dec. 2003
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.12
, pp. 3235-3249
-
-
Hero, A.O.1
-
3
-
-
45249119255
-
Secure communication over fading channels
-
Jun
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
4
-
-
79952846257
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
Apr
-
E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, Apr. 2011
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2083-2114
-
-
Ekrem, E.1
Ulukus, S.2
-
5
-
-
84867488674
-
Lattice codes achieving strong secrecy over mod- Gaussian channel
-
Cambridge, MA, USA, Jul
-
C. Ling, L. Luzzi, and J.-C. Belfiore, "Lattice codes achieving strong secrecy over mod- Gaussian channel," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Cambridge, MA, USA, Jul. 2012, pp. 2306-2310
-
(2012)
Proc IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2306-2310
-
-
Ling, C.1
Luzzi, L.2
Belfiore, J.-C.3
-
6
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
7
-
-
70349223815
-
Fixed SINR solutions for the MIMO wiretap channel
-
Speech, Signal Process. (ICASSP), Taiwan Apr
-
A. L. Swindlehurst, "Fixed SINR solutions for the MIMO wiretap channel," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), Taiwan, Apr. 2009, pp. 2437-2440
-
(2009)
Proc IEEE Int. Conf. Acoust
, pp. 2437-2440
-
-
Swindlehurst, A.L.1
-
8
-
-
84861311185
-
Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise
-
Pacific Grove, CA, USA Nov
-
Q. Li, W. Ma, and A. So, "Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise," in Proc. Asilomar Conf. Signal Syst. Comput., Pacific Grove, CA, USA, Nov. 2011, pp. 207-211
-
(2011)
Proc. Asilomar Conf. Signal Syst. Comput
, pp. 207-211
-
-
Li, Q.1
Ma, W.2
So, A.3
-
9
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
10
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar
-
G. Zheng, L.-C. Choo, andK.K.Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, K.K.2
Wong, L.-C.3
-
11
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct
-
I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, pp. 5003-5011, Oct. 2009
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
12
-
-
79957465600
-
Wireless secrecy regions with friendly jamming
-
Jun
-
J.Vilela,M. Bloch, J. Barros, and S.W.McLaughlin, "Wireless secrecy regions with friendly jamming," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 256-266, Jun. 2011
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.2
, pp. 256-266
-
-
Bloch, J.VilelaM.1
Barros, J.2
McLaughlin, S.W.3
-
13
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr
-
S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.A.3
-
14
-
-
84868241090
-
Outage constrained secrecy rate maximization using cooperative jamming
-
MI, USA, Aug
-
S. Luo, J. Li, and A. Petropulu, "Outage constrained secrecy rate maximization using cooperative jamming," in Proc. IEEE Statist. Signal Process. Workshop (SSP), Ann Arbor, MI, USA, Aug. 2012
-
(2012)
Proc IEEE Statist. Signal Process. Workshop (SSP), Ann Arbor
-
-
Luo, S.1
Li, J.2
Petropulu, A.3
-
15
-
-
84870499401
-
A general relaying transmission protocol for MIMO secrecy communications
-
Nov
-
Z. Ding, M. Peng, and H.-H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.-H.3
-
16
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
17
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Apr
-
Y. Liu, J. Li, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.P.3
-
18
-
-
79960857245
-
Physical layer wireless security made fast and channel independent
-
Shanghai, China Apr
-
S. Gollakota and D. Katabi, "Physical layer wireless security made fast and channel independent," in Proc. IEEE Int. Conf. Comput. Commun., Shanghai, China, Apr. 2011, pp. 1125-1133
-
(2011)
Proc IEEE Int. Conf. Comput. Commun
, pp. 1125-1133
-
-
Gollakota, S.1
Katabi, D.2
-
19
-
-
67651165310
-
Optimized gain control for single-frequency relaying with loop interference
-
Jun
-
T. Riihonen, S. Werner, and R. Wichman, "Optimized gain control for single-frequency relaying with loop interference," IEEE Trans. Wireless Commun., vol. 8, no. 6, pp. 2801-2806, Jun. 2009
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.6
, pp. 2801-2806
-
-
Riihonen, T.1
Werner, S.2
Wichman, R.3
-
20
-
-
84871795799
-
Full-duplex relaying over block fading channels: A diversity perspective
-
Dec. 2012
-
I. Krikidis, H. Suraweera, S. Yang, and K. Berberidis, "Full-duplex relaying over block fading channels: A diversity perspective," IEEE Trans. Wireless Commun., vol. 11, no. 12, pp. 4524-4535, Dec. 2012
-
IEEE Trans. Wireless Commun.
, vol.11
, Issue.12
, pp. 4524-4535
-
-
Krikidis, I.1
Suraweera, H.2
Yang, S.3
Berberidis, K.4
-
21
-
-
81455148096
-
Mitigation of loopback self-interference in full-duplex MIMO relays
-
Dec
-
T. Riihonen, S. Werner, and R. Wichman, "Mitigation of loopback self-interference in full-duplex MIMO relays," IEEE Trans. Signal Process., vol. 59, no. 12, pp. 5983-5993, Dec. 2011
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.12
, pp. 5983-5993
-
-
Riihonen, T.1
Werner, S.2
Wichman, R.3
-
22
-
-
84862615319
-
Full-duplex MIMO relaying: Achievable rates under limited dynamic range
-
Sep. 2012
-
B. P. Day, A. R. Margetts, D. W. Bliss, and P. Schniter, "Full-duplex MIMO relaying: Achievable rates under limited dynamic range," IEEE J. Sel. Areas Commun., vol. 30, no. 8, pp. 1541-1553, Sep. 2012
-
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.8
, pp. 1541-1553
-
-
Day, B.P.1
Margetts, A.R.2
Bliss, D.W.3
Schniter, P.4
-
23
-
-
84876230538
-
Design and characterization of a full-duplexmulti-antenna system forWiFi networks
-
submitted for publication
-
M. Duarte, A. Sabharwal, V. Aggarwal, R. Jana, K. K. Ramakrishnan, C. Rice, and N. K. Shankaranarayanan, "Design and characterization of a full-duplexmulti-antenna system forWiFi networks," IEEE Trans. Veh. Technol. Oct. 2012 [Online]. Available: http://arxiv.org/pdf/1210. 1639v2.pdf, submitted for publication
-
(2012)
IEEE Trans. Veh. Technol. Oct
-
-
Duarte, M.1
Sabharwal, A.2
Aggarwal, V.3
Jana, R.4
Ramakrishnan, K.K.5
Rice, C.6
Shankaranarayanan, N.K.7
-
24
-
-
79957993586
-
Self-interference suppression in full-duplex MIMO relays
-
Pacific Grove, CA, USA Nov
-
P. Lioliou, M. Viberg, M. Coldrey, and F. Athley, "Self-interference suppression in full-duplex MIMO relays," in Proc. Asilomar Conf. Sign. Syst. Comput., Pacific Grove, CA, USA, Nov. 2007, pp. 658-662
-
(2007)
Proc. Asilomar Conf. Sign. Syst. Comput
, pp. 658-662
-
-
Lioliou, P.1
Viberg, M.2
Coldrey, M.3
Athley, F.4
-
25
-
-
80052944349
-
Hybrid full-duplex/halfduplex relaying with transmit power adaptation
-
Sep
-
T. Riihonen, S. Werner, and R. Wichman, "Hybrid full-duplex/ halfduplex relaying with transmit power adaptation," IEEE Trans.Wireless Commun., vol. 10, no. 9, pp. 3074-3085, Sep. 2011
-
(2011)
IEEE Trans.Wireless Commun.
, vol.10
, Issue.9
, pp. 3074-3085
-
-
Riihonen, T.1
Werner, S.2
Wichman, R.3
-
26
-
-
84861327707
-
A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures
-
PacificGrove, CA, USA Nov
-
A. Mukherjee and A. L. Swindlehurst, "A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures," in Proc. Asilomar Conf. Sign. Syst. Comput., PacificGrove, CA, USA, Nov. 2011, pp. 265-269
-
(2011)
Proc. Asilomar Conf. Sign. Syst. Comput
, pp. 265-269
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
27
-
-
84867873837
-
Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
-
Oct
-
W. Li,M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.10
, pp. 1628-1631
-
-
Lim. Ghogho, W.1
Chen, B.2
Xiong, C.3
-
28
-
-
84863607151
-
Single antenna full duplex communications using a common carrier
-
Orlando, FL, USA, Apr
-
M. E. Knox, "Single antenna full duplex communications using a common carrier," in Proc. 13th Annu. IEEE Wireless Microw. Technol. Conf. (WAMICON), Orlando, FL, USA, Apr. 7-9, 2013, pp. 1-6
-
(2013)
Proc. 13th Annu IEEE Wireless Microw. Technol. Conf. (WAMICON)
, vol.7-9
, pp. 1-6
-
-
Knox, M.E.1
-
29
-
-
38549110178
-
Complexmatrix decomposition and quadratic programming
-
Y. Huang and S. Zhang, "Complexmatrix decomposition and quadratic programming," Math. Oper. Res., vol. 32, no. 3, pp. 758-768, 2007
-
(2007)
Math. Oper. Res.
, vol.32
, Issue.3
, pp. 758-768
-
-
Huang, Y.1
Zhang, S.2
-
30
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct
-
J. Li, A. P. Petropulu, and S.Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
31
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Jun
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Nice, France, Jun. 2007, pp. 2466-2470
-
(2007)
Proc IEEE Int. Symp. Inf. Theory (ISIT), Nice, France
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
32
-
-
0030150209
-
Distribution of noncentral indefinite quadratic forms in complex normal variables
-
May
-
D. Raphaeli, "Distribution of noncentral indefinite quadratic forms in complex normal variables," IEEE Trans. Inf. Theory, vol. 42, no. 3, pp. 1002-1007, May 1996
-
(1996)
IEEE Trans. Inf. Theory
, vol.42
, Issue.3
, pp. 1002-1007
-
-
Raphaeli, D.1
-
33
-
-
15244346000
-
The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems
-
DOI 10.1007/s10479-004-5022-1
-
L. T. H. An and P. D. Tao, "The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems," Ann. Oper. Res., vol. 133, pp. 23-46, 2005. (Pubitemid 40389738)
-
(2005)
Annals of Operations Research
, vol.133
, Issue.1-4
, pp. 23-46
-
-
An, L.T.H.1
Tao, P.D.2
|