-
1
-
-
67349259569
-
Breaking spectrum gridlock with cognitive radios: An information theoretic perspective
-
May
-
A. Goldsmith, S. A. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: an information theoretic perspective," Proc. IEEE, vol. 97, no. 5, pp. 894-914, May 2009.
-
(2009)
Proc. IEEE
, vol.97
, Issue.5
, pp. 894-914
-
-
Goldsmith, A.1
Jafar, S.A.2
Maric, I.3
Srinivasa, S.4
-
2
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
84863913546
-
Physical-layer secrecy for OFDM transmissions over fading channels
-
Aug.
-
F. Renna, N. Laurenti, and H. Poor, "Physical-layer secrecy for OFDM transmissions over fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
-
(2012)
IEEE Trans. Inf Forensics Security
, vol.7
, Issue.4
, pp. 1354-1367
-
-
Renna, F.1
Laurenti, N.2
Poor, H.3
-
4
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
5
-
-
84897584002
-
Jamming games in the MIMO wiretap channel with an active eavesdropper
-
Jan.
-
A. Mukherjee, A. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Process., vol. 61, no. 1, pp. 82-91, Jan. 2013.
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.1
, pp. 82-91
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
6
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. Chen, R. Zhang, L. Song, and Z. H. B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Jiao, Z.H.B.4
-
7
-
-
45249101530
-
The general gaussian multiple access and twoway wire-tap channels: Achievable rates and cooperative jamming
-
June
-
E. Tekin and A. Yener, "The general gaussian multiple access and twoway wire-tap channels: achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 4005-4019, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 4005-4019
-
-
Tekin, E.1
Yener, A.2
-
8
-
-
84873097542
-
Improving secrecy rate via spectrum leasing for friendly jamming
-
I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 134-145
-
-
Stanojev, I.1
Yener, A.2
-
9
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sept.
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sept. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
10
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojevic, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojevic, P.3
Poor, H.V.4
-
11
-
-
61349186445
-
Capacity of cognitive interference channels with and without secrecy
-
Feb.
-
Y. Liang, A. Somekh-Baruch, H. Poor, S. Shamai, and S. Verdu, "Capacity of cognitive interference channels with and without secrecy," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.2
, pp. 604-619
-
-
Liang, Y.1
Somekh-Baruch, A.2
Poor, H.3
Shamai, S.4
Verdu, S.5
-
12
-
-
80051757604
-
An information secrecy game in cognitive radio networks
-
Sept.
-
Y. Wu and K. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, , vol. 6, no. 3, pp. 831-842, Sept. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 831-842
-
-
Wu, Y.1
Liu, K.2
-
13
-
-
77953222550
-
On the relationship between the multi-antenna secrecy communications and cognitive radio communications
-
June
-
L. Zhang, R. Zhang, Y.-C. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," IEEE Trans. Commun., vol. 58, no. 6, pp. 1877-1886, June 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.6
, pp. 1877-1886
-
-
Zhang, L.1
Zhang, R.2
Liang, Y.-C.3
Xin, Y.4
Cui, S.5
-
14
-
-
79952680469
-
Secure communication in multiantenna cognitive radio networks with imperfect channel state information
-
Apr.
-
Y. Pei, Y.-C. Liang, K. C. Teh, and K. H. Li, "Secure communication in multiantenna cognitive radio networks with imperfect channel state information," IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1683-1693, Apr. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.4
, pp. 1683-1693
-
-
Pei, Y.1
Liang, Y.-C.2
Teh, K.C.3
Li, K.H.4
-
15
-
-
77951274829
-
Secure communication over MISO cognitive radio channels
-
Apr.
-
Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.4
, pp. 1494-1502
-
-
Pei, Y.1
Liang, Y.-C.2
Zhang, L.3
Teh, K.C.4
Li, K.H.5
-
16
-
-
84891556599
-
Proposed relay selection scheme for physical layer security in cognitive radio networks
-
June
-
H. Sakran, M. Shokair, O. Nasr, S. El-Rabaie, and A. El-Azm, "Proposed relay selection scheme for physical layer security in cognitive radio networks," IET Commun., vol. 6, no. 16, pp. 2676-2687, June 2012.
-
(2012)
IET Commun.
, vol.6
, Issue.16
, pp. 2676-2687
-
-
Sakran, H.1
Shokair, M.2
Nasr, O.3
El-Rabaie, S.4
El-Azm, A.5
-
18
-
-
42549161946
-
Low-complexity distributed algorithms for spectrum balancing in multi-user DSL networks
-
DOI 10.1109/ICC.2006.255311, 4024693, 2006 IEEE International Conference on Communications, ICC 2006
-
J. Papandriopoulos and J. Evans, "Low-complexity distributed algorithms for spectrum balancing in multi-user DSL networks," in Proc. IEEE Int. Conf. Commun., vol. 46, no. 5, pp. 3270-3275, June 2006. (Pubitemid 351575737)
-
(2006)
IEEE International Conference on Communications
, vol.7
, pp. 3270-3275
-
-
Papandriopoulos, J.1
Evans, J.S.2
-
19
-
-
34249812361
-
A tutorial on geometric programming
-
DOI 10.1007/s11081-007-9001-7
-
L. V. S. Boyd, S.-J. Kim, and A. Hassibi, "A tutorial on geometric programming," Optimization Eng., vol. 7, no. 5, pp. 67-127, 2007. (Pubitemid 46844969)
-
(2007)
Optimization and Engineering
, vol.8
, Issue.1
, pp. 67-127
-
-
Boyd, S.1
Kim, S.-J.2
Vandenberghe, L.3
Hassibi, A.4
-
20
-
-
80855147572
-
Downlink radio resource allocation in OFDMA spectrum sharing environment with partial channel state information
-
Oct.
-
N. Mokari, K. Navaie, and M. G. Khoshkholgh, "Downlink radio resource allocation in OFDMA spectrum sharing environment with partial channel state information," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3482-3495, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3482-3495
-
-
Mokari, N.1
Navaie, K.2
Khoshkholgh, M.G.3
-
21
-
-
41149113317
-
Optimal downlink OFDMA resource allocation with linear complexity to maximize ergodic rates
-
DOI 10.1109/TWC.2008.4472014, 4472014
-
I. C. Wong and B. L. Evans, "Optimal downlink OFDMA resource allocation with linear complexity to maximize ergodic capacity," IEEE Trans. Wireless Commun., vol. 7, no. 3, pp. 962-971, Mar. 2008. (Pubitemid 351436484)
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.3
, pp. 962-971
-
-
Wong, I.C.1
Evans, B.L.2
-
22
-
-
60149090305
-
Optimal resource allocation in the OFDMA downlink with imperfect channel knowledge
-
I. Wong and B. Evans, "Optimal resource allocation in the OFDMA downlink with imperfect channel knowledge," IEEE Trans. Commun., vol. 57, no. 1, pp. 232-241, 2009.
-
(2009)
IEEE Trans. Commun.
, vol.57
, Issue.1
, pp. 232-241
-
-
Wong, I.1
Evans, B.2
-
23
-
-
48449105712
-
Power control in wireless cellular networks
-
July
-
M. Chiang, P. Hande, T. Lan, and C. W. Tan, "Power control in wireless cellular networks," Foundations Trends Netw., vol. 2, no. 4, pp. 381-533, July 2008.
-
(2008)
Foundations Trends Netw.
, vol.2
, Issue.4
, pp. 381-533
-
-
Chiang, M.1
Hande, P.2
Lan, T.3
Tan, C.W.4
-
25
-
-
79960422632
-
Iterative resource allocation for maximizing weighted sum min-rate in downlink cellular OFDMA systems
-
T. Wang and L. Vandendorpe, "Iterative resource allocation for maximizing weighted sum min-rate in downlink cellular OFDMA systems," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 223-234, 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.1
, pp. 223-234
-
-
Wang, T.1
Vandendorpe, L.2
-
29
-
-
34547463520
-
Selected topics in robust convex optimization
-
July
-
A. Ben-Tal and A. Nemirovski, "Selected topics in robust convex optimization," Mathematical Programming, vol. 1, no. 1, pp. 125-158, July 2007.
-
(2007)
Mathematical Programming
, vol.1
, Issue.1
, pp. 125-158
-
-
Ben-Tal, A.1
Nemirovski, A.2
-
30
-
-
3042762207
-
The price of robustness
-
DOI 10.1287/opre.1030.0065
-
D. Bertsimas and M. Sim, "The price of robustness," Operations Research, vol. 52, no. 1, pp. 35-53, Feb. 2004. (Pubitemid 40000812)
-
(2004)
Operations Research
, vol.52
, Issue.1
, pp. 35-53
-
-
Bertsimas, D.1
Sim, M.2
|