-
1
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojević, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojević, P.3
Poor, H.V.4
-
2
-
-
80051779980
-
Secure communications over wireless broadcast networks: Stability and utility maximization
-
Sep.
-
Y. Liang, H. V. Poor, and L. Ying, "Secure communications over wireless broadcast networks: Stability and utility maximization," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 682-692, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 682-692
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
3
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
4
-
-
68349116049
-
Information theoretic security
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, no. 4/5, pp. 355-580, Jun. 2009.
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
5
-
-
0016562514
-
The wire-tap channel
-
Jan.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Jan. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
6
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
7
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
8
-
-
77958560746
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
9
-
-
79955465834
-
On ergodic secrecy rate for gaussian MISO wiretap channels
-
Apr.
-
J. Li and A. P. Petropulu, "On ergodic secrecy rate for Gaussian MISO wiretap channels," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1176-1187, Apr. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.4
, pp. 1176-1187
-
-
Li, J.1
Petropulu, A.P.2
-
10
-
-
77953222550
-
On the relationship between the multi-antenna secrecy communications and cognitive radio communications
-
Jun.
-
L. Zhang, R. Zhang, Y.-C. Liang, Y. Xin, and S. Cui, "On the relationship between the multi-antenna secrecy communications and cognitive radio communications," IEEE Trans. Commun., vol. 58, no. 6, pp. 1877-1886, Jun. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.6
, pp. 1877-1886
-
-
Zhang, L.1
Zhang, R.2
Liang, Y.-C.3
Xin, Y.4
Cui, S.5
-
11
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
12
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gammal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gammal, H.E.3
-
13
-
-
84872727645
-
On secrecy capacity of fast fading multipleinput wiretap channels with statistical CSIT
-
Feb.
-
S.-C. Lin and P.-H. Lin, "On secrecy capacity of fast fading multipleinput wiretap channels with Statistical CSIT," IEEE Trans. Inf. Forensics Security, vol. 8, no. 2, pp. 414-419, Feb. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.2
, pp. 414-419
-
-
Lin, S.-C.1
Lin, P.-H.2
-
14
-
-
45249101530
-
The general gaussian multiple access and two-way wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
15
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. E. Gammal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gammal, H.E.2
-
16
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
17
-
-
80052889357
-
Cooperative jamming for secure communication in MIMO relay networks
-
Oct.
-
J. Huang and L. A. Swindlehurst, "Cooperative jamming for secure communication in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, L.A.2
-
18
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
19
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs relay chatting
-
Jun.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs relay chatting," IEEE Trans. Wireless Commun., vol. 10, no. 6, pp. 1725-1729, Jun. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.6
, pp. 1725-1729
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
20
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Feb.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
21
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
22
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise- aided approach
-
Mar.
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise- aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
23
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
24
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and L. A. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1702, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1696-1702
-
-
Huang, J.1
Swindlehurst, L.A.2
-
25
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and L. A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, L.A.2
-
27
-
-
84861194117
-
A new design paradigm for MIMO cognitive radio with primary user rate constraint
-
May
-
K. Cumanan, R. Zhang, and S. Lambotharan, "A new design paradigm for MIMO cognitive radio with primary user rate constraint," IEEE Commun. Lett., vol. 16, no. 5, pp. 706-709, May 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.5
, pp. 706-709
-
-
Cumanan, K.1
Zhang, R.2
Lambotharan, S.3
-
28
-
-
84871955826
-
Signaling strategy optimization for gaussian MIMO wiretap channel
-
Ottawa, ON, Canada, Jun.
-
Q. Shi, E. Song, and G. Chen, "Signaling strategy optimization for Gaussian MIMO wiretap channel," in Proc. IEEE ICC, Ottawa, ON, Canada, Jun. 2012, pp. 3611-3615.
-
(2012)
Proc. IEEE ICC
, pp. 3611-3615
-
-
Shi, Q.1
Song, E.2
Chen, G.3
-
29
-
-
0037686659
-
The concave-convex procedure
-
Apr.
-
A. L. Yuille and A. Rangarajan, "The concave-convex procedure," Neural Comput., vol. 15, no. 4, pp. 915-936, Apr. 2003.
-
(2003)
Neural Comput.
, vol.15
, Issue.4
, pp. 915-936
-
-
Yuille, A.L.1
Rangarajan, A.2
-
30
-
-
0004083131
-
Capacity of multi-antenna gaussian channels
-
Nov.
-
E. Telatar, "Capacity of multi-antenna Gaussian channels," Eur. Trans. Telecommun., vol. 10, no. 6, pp. 585-596, Nov. 1999.
-
(1999)
Eur. Trans. Telecommun.
, vol.10
, Issue.6
, pp. 585-596
-
-
Telatar, E.1
-
34
-
-
0037304809
-
Robust adaptive beamforming using worst-case performance optimization: A solution to the signal mismatch problem
-
Feb.
-
S. Vorobyov, A. Gershman, and Z.-Q. Luo, "Robust adaptive beamforming using worst-case performance optimization: A solution to the signal mismatch problem," IEEE Trans. Signal Process., vol. 51, no. 2, pp. 313-324, Feb. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.2
, pp. 313-324
-
-
Vorobyov, S.1
Gershman, A.2
Luo, Z.-Q.3
-
35
-
-
54949150297
-
On the relationship between robust minimum variance beamformers with probabilistic and worst-case distortionless response constraints
-
Nov.
-
S. Vorobyov, H. Chen, and A. Gershman, "On the relationship between robust minimum variance beamformers with probabilistic and worst-case distortionless response constraints," IEEE Trans. Signal Process., vol. 56, no. 11, pp. 5719-5724, Nov. 2008.
-
(2008)
IEEE Trans. Signal Process.
, vol.56
, Issue.11
, pp. 5719-5724
-
-
Vorobyov, S.1
Chen, H.2
Gershman, A.3
-
36
-
-
18844410304
-
Robust minimum variance beamforming
-
May
-
R. Lorenz and S. Boyd, "Robust minimum variance beamforming," IEEE Trans. Signal Process., vol. 53, no. 5, pp. 1684-1696, May 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.5
, pp. 1684-1696
-
-
Lorenz, R.1
Boyd, S.2
-
37
-
-
33646035470
-
Robust transmit eigen beamforming based on imperfect channel state information
-
May
-
A. Abdel-Samad, T. Davidson, and A. Gershman, "Robust transmit eigen beamforming based on imperfect channel state information," IEEE Trans. Signal Process., vol. 54, no. 2, pp. 1596-1609, May 2006.
-
(2006)
IEEE Trans. Signal Process.
, vol.54
, Issue.2
, pp. 1596-1609
-
-
Abdel-Samad, A.1
Davidson, T.2
Gershman, A.3
-
38
-
-
70349682785
-
Robust interference control techniques for multi-user cognitive radios using worst-case performance optimization
-
Pacific Grove, CA, USA, Oct.
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "Robust interference control techniques for multi-user cognitive radios using worst-case performance optimization," in Proc. Asilomar Conf. Sign., Syst. and Comp., Pacific Grove, CA, USA, Oct. 2008, pp. 378-382.
-
(2008)
Proc. Asilomar Conf. Sign., Syst. and Comp.
, pp. 378-382
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
39
-
-
77951114748
-
Robust interference control techniques for cognitive radios using worst-case performance optimization
-
Auckland, New Zealand, Dec.
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "Robust interference control techniques for cognitive radios using worst-case performance optimization," in Proc. ISITA, Auckland, New Zealand, Dec. 2008, pp. 1-5.
-
(2008)
Proc. ISITA
, pp. 1-5
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
40
-
-
67549134798
-
A robust beamforming based interference control technique and its performance for cognitive radios
-
Oct.
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "A robust beamforming based interference control technique and its performance for cognitive radios," in Proc. ISCIT, Oct. 2008, pp. 9-13.
-
(2008)
Proc. ISCIT
, pp. 9-13
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
41
-
-
85008008314
-
Worst-case MSE precoder design for imperfectly known MIMO communication channels
-
Aug.
-
Y. Guo and B. Levy, "Worst-case MSE precoder design for imperfectly known MIMO communication channels," IEEE Trans. Signal Process., vol. 53, no. 8, pp. 2918-2930, Aug. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.8
, pp. 2918-2930
-
-
Guo, Y.1
Levy, B.2
-
42
-
-
30344443099
-
A robust maximin approach for MIMO communications with partial channel state information based on convex optimization
-
Jan.
-
A. Pascual-Iserte, D. Palomar, A. Pérez-Neria, and M. Lagunas, "A robust maximin approach for MIMO communications with partial channel state information based on convex optimization," IEEE Trans. Signal Process., vol. 54, no. 1, pp. 346-360, Jan. 2006.
-
(2006)
IEEE Trans. Signal Process.
, vol.54
, Issue.1
, pp. 346-360
-
-
Pascual-Iserte, A.1
Palomar, D.2
Pérez-Neria, A.3
Lagunas, M.4
-
43
-
-
0036611573
-
Spectral efficiency in the wideband regime
-
Jun.
-
S. Verdú, "Spectral efficiency in the wideband regime," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1319-1343, Jun. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.6
, pp. 1319-1343
-
-
Verdú, S.1
-
44
-
-
84877752784
-
Full rank solutions for the MIMO gaussian wiretap channel with an average power constraint
-
May
-
S. A. A. Fakoorian and L. A. Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2620-2631
-
-
Fakoorian, S.A.A.1
Swindlehurst, L.A.2
-
45
-
-
0002911084
-
D.C. Optimization: Theory, methods and algorithms
-
R. Horst and P. Pardalos, Eds. Dordrecht, Germany: Kluwer
-
H. Tuy, "D.C. optimization: Theory, methods and algorithms," in Handbook of Global Optimization, Nonconvex Optimization and Its Applications, R. Horst and P. Pardalos, Eds. Dordrecht, Germany: Kluwer, 1995, pp. 149-216.
-
(1995)
Handbook of Global Optimization, Nonconvex Optimization and Its Applications
, pp. 149-216
-
-
Tuy, H.1
-
46
-
-
0003004622
-
Linear matrix inequalities in system and control theory
-
Philadelphia, PA, USA: SIAM
-
S. Boyd, L. E. Ghaoui, E. Feron, and V. Balakrishnan, "Linear matrix inequalities in system and control theory," in Studies in Applied Mathematics. Philadelphia, PA, USA: SIAM, 1994.
-
(1994)
Studies in Applied Mathematics
-
-
Boyd, S.1
Ghaoui, L.E.2
Feron, E.3
Balakrishnan, V.4
|