-
1
-
-
84881572098
-
Secure beamforming for MIMO two-way transmission with an untrusted relay
-
J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, "Secure beamforming for MIMO two-way transmission with an untrusted relay," in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), 2013, pp. 4180-4185.
-
(2013)
Proc. IEEE Wireless Commun. Netw. Conf. (WCNC)
, pp. 4180-4185
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Xia, B.4
Ma, X.5
-
2
-
-
67650587787
-
Optimal beamforming for two-way multi-antenna relay channel with analogue network coding
-
R. Zhang, Y.-C. Liang, C. C. Chai, and S. Cui, "Optimal beamforming for two-way multi-antenna relay channel with analogue network coding," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 699-712, 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.5
, pp. 699-712
-
-
Zhang, R.1
Liang, Y.-C.2
Chai, C.C.3
Cui, S.4
-
3
-
-
79957663476
-
Optimal design of spatial source-and-relaymatrices for a non-regenerative two-way MIMO relay system
-
May
-
S.Xu and Y. Hua, "Optimal design of spatial source-and-relaymatrices for a non-regenerative two-way MIMO relay system," IEEE Trans. Wireless Commun., vol. 10, no. 5, pp. 1645-1655, May 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.5
, pp. 1645-1655
-
-
Xu, S.1
Hua, Y.2
-
4
-
-
84863182638
-
Joint source and relay precoding designs for MIMO two-way relaying based on MSE criterion
-
Mar.
-
R. Wang and M. Tao, "Joint source and relay precoding designs for MIMO two-way relaying based on MSE criterion," IEEE Trans. Signal Process., vol. 60, no. 3, pp. 1352-1365, Mar. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.3
, pp. 1352-1365
-
-
Wang, R.1
Tao, M.2
-
5
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
6
-
-
80054058314
-
Optimal power allocation for secure multicarrier relay systems
-
Nov.
-
C. Jeong and I.-M. Kim, "Optimal power allocation for secure multicarrier relay systems," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.11
, pp. 5428-5442
-
-
Jeong, C.1
Kim, I.-M.2
-
7
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
8
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
9
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
-
Oct.
-
D. Ng, E. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.1
Lo, E.2
Schober, R.3
-
10
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.2
-
11
-
-
84862571591
-
Relay placement for physical layer security: A secure connection perspective
-
Jun.
-
J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.6
, pp. 878-881
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
-
12
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
13
-
-
84863956395
-
Improving wireless security for bidirectional communication scenarios
-
Jul.
-
Z. Ding, M. Xu, J. Lu, and F. Liu, "Improving wireless security for bidirectional communication scenarios," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2842-2848, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2842-2848
-
-
Ding, Z.1
Xu, M.2
Lu, J.3
Liu, F.4
-
15
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
16
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
H.-M. W. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.W.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
17
-
-
80051749392
-
Physical-layer secret key agreement in two-way wireless relaying systems
-
Sep.
-
T. Shimizu, H. Iwai, and H. Sasaoka, "Physical-layer secret key agreement in two-way wireless relaying systems," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 650-660, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 650-660
-
-
Shimizu, T.1
Iwai, H.2
Sasaoka, H.3
-
18
-
-
45249101530
-
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
19
-
-
84938932265
-
Coding for relay channels with confidential messages
-
Y. Oohama, "Coding for relay channels with confidential messages," in Proc. Inf. Theory Workshop, 2001, pp. 87-89.
-
(2001)
Proc. Inf. Theory Workshop
, pp. 87-89
-
-
Oohama, Y.1
-
20
-
-
67249087217
-
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
-
Dec. 4
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay: A case for cooperative jamming," in Proc. IEEE Global Telecommun. Conf., Dec. 4, 2008, pp. 1-5.
-
(2008)
Proc. IEEE Global Telecommun. Conf.
, pp. 1-5
-
-
He, X.1
Yener, A.2
-
21
-
-
76649123145
-
Two-hop secure communication using an untrusted relay
-
10, May
-
X. He and A. Yener, "Two-hop secure communication using an untrusted relay," EURASIP J. Wirel. Commun. Netw., vol. 2009, pp. 9:1-9:10, May 2009.
-
(2009)
EURASIP J. Wirel. Commun. Netw.
, vol.2009
, Issue.9
, pp. 1-9
-
-
He, X.1
Yener, A.2
-
22
-
-
84867800602
-
Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes
-
L. Sun, T. Zhang, Y. Li, and H. Niu, "Performance study of two-hop amplify-and-forward systems with untrustworthy relay nodes," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3801-3807, 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3801-3807
-
-
Sun, L.1
Zhang, T.2
Li, Y.3
Niu, H.4
-
23
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
24
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct.
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
25
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forwardMIMOuntrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forwardMIMOuntrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
26
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
J. Huang, A. Mukherjee, and A. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.3
-
27
-
-
33847736358
-
Spectral efficient protocols for half-duplex fading relay channels
-
DOI 10.1109/JSAC.2007.070213
-
B. Rankov and A. Wittneben, "Spectral efficient protocols for halfduplex fading relay channels," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007. (Pubitemid 46376100)
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.2
, pp. 379-389
-
-
Rankov, B.1
Wittneben, A.2
-
28
-
-
55349107839
-
Performance bounds for bidirectional coded cooperation protocols
-
Aug.
-
S. J. Kim, P. Mitran, and V. Tarokh, "Performance bounds for bidirectional coded cooperation protocols," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 5253-5241, Aug. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 5253-5241
-
-
Kim, S.J.1
Mitran, P.2
Tarokh, V.3
-
29
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G.Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
30
-
-
85032752455
-
Semidefinite relaxation of quadratic optimization problems
-
Z.-Q. Luo, W.-K. Ma, A.-C. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, 2010.
-
(2010)
IEEE Signal Process. Mag.
, vol.27
, Issue.3
, pp. 20-34
-
-
Luo, Z.-Q.1
Ma, W.-K.2
So, A.-C.3
Ye, Y.4
Zhang, S.5
-
31
-
-
77953745487
-
Degrees of freedom of the MIMO y channel: Signal space alignment for network coding
-
Jul.
-
N. Lee, J.-B. Lim, and J. Chun, "Degrees of freedom of the MIMO y channel: Signal space alignment for network coding," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3332-3342, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3332-3342
-
-
Lee, N.1
Lim, J.-B.2
Chun, J.3
-
34
-
-
84966204312
-
Numerical methods for computing angles between linear subspaces
-
A. Bjorck and G. H. Golub, "Numerical methods for computing angles between linear subspaces," Math. Comput., vol. 27, no. 123, pp. 579-594, 1973.
-
(1973)
Math. Comput.
, vol.27
, Issue.123
, pp. 579-594
-
-
Bjorck, A.1
Golub, G.H.2
-
35
-
-
76949097504
-
Power allocation for F/TDMA multiuser two-way relay networks
-
M. Chen and A. Yener, "Power allocation for F/TDMA multiuser two-way relay networks," IEEE Trans. Wireless Commun., vol. 9, no. 2, pp. 546-551, 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.2
, pp. 546-551
-
-
Chen, M.1
Yener, A.2
-
36
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Jun.
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory, Jun. 2007, pp. 2466-2470.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
37
-
-
80455134900
-
Fractional QCQP with applications in ML steering direction estimation for radar detection
-
A. De Maio, Y. Huang, D. Palomar, S. Zhang, and A. Farina, "Fractional QCQP with applications in ML steering direction estimation for radar detection," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 172-185, 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 172-185
-
-
De Maio, A.1
Huang, Y.2
Palomar, D.3
Zhang, S.4
Farina, A.5
-
38
-
-
79957939502
-
New results on hermitian matrix rank-one decomposition
-
W. Ai, Y. Huang, and S. Zhang, "New results on hermitian matrix rank-one decomposition," Math. Programm., vol. 128, no. 1-2, pp. 253-283, 2011.
-
(2011)
Math. Programm.
, vol.128
, Issue.1-2
, pp. 253-283
-
-
Ai, W.1
Huang, Y.2
Zhang, S.3
|