-
1
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
2
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1869-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1869-1707
-
-
Huang, J.1
Swindlehurst, A.L.2
-
3
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach
-
Mar.
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
4
-
-
79957977565
-
Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity
-
W. Shi and J. Ritcey, "Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity," in Conf. Rec. 44th Asilomar Conf. Signals, Syst. Comput., 2010, pp. 300-304.
-
(2010)
Conf. Rec. 44th Asilomar Conf. Signals, Syst. Comput.
, pp. 300-304
-
-
Shi, W.1
Ritcey, J.2
-
5
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
6
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
7
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
8
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.1
-
9
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong andM. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.2
-
10
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
11
-
-
84880157215
-
Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers
-
Jun.
-
J. Yang, I.-M. Kim, and D. I. Kim, "Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdroppers," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2840-2852, Jun. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2840-2852
-
-
Yang, J.1
Kim, I.-M.2
Kim, D.I.3
-
12
-
-
84883309968
-
Power-constrained optimal cooperative jamming for multiuser broadcast channel
-
Aug.
-
J. Yang, I.-M. Kim, and D. I. Kim, "Power-constrained optimal cooperative jamming for multiuser broadcast channel," IEEE Wireless Commun. Lett., vol. 2, no. 4, pp. 411-414, Aug. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.4
, pp. 411-414
-
-
Yang, J.1
Kim, I.-M.2
Kim, D.I.3
-
13
-
-
84931425598
-
Secret communication using artificial noise
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. 62nd IEEE VTC-Fall, 2005, vol. 3, pp. 1906-1910.
-
(2005)
Proc. 62nd IEEE VTC-Fall
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
14
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
15
-
-
84883380753
-
On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
-
Sep.
-
K.-H. Park, T. Wang, and M.-S. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming," IEEE J Sel. Areas Comm., vol. 31, no. 9, pp. 1741-1750, Sep. 2013.
-
(2013)
IEEE J Sel. Areas Comm.
, vol.31
, Issue.9
, pp. 1741-1750
-
-
Park, K.-H.1
Wang, T.2
Alouini, M.-S.3
-
16
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Apr.
-
Y. Liu, J. Li, and A. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.3
-
17
-
-
82055177123
-
Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
-
Dec.
-
D. Goeckel et al., "Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks," IEEE J Sel. Areas Comm., vol. 29, no. 10, pp. 2067-2076, Dec. 2011.
-
(2011)
IEEE J Sel. Areas Comm.
, vol.29
, Issue.10
, pp. 2067-2076
-
-
Goeckel, D.1
-
18
-
-
45249101530
-
The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
19
-
-
45249090083
-
Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions
-
Jun.
-
R. Liu, I. Maric, P. Spasojevic, and R. D. Yates, "Discrete memoryless interference and broadcast channels with confidential messages: Secrecy rate regions," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2493-2507, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2493-2507
-
-
Liu, R.1
Maric, I.2
Spasojevic, P.3
Yates, R.D.4
-
20
-
-
77953844596
-
Secrecy rate optimization under cooperation with perfect channel state information
-
J. Li, A. P. Petropulu, and S. Weber, "Secrecy rate optimization under cooperation with perfect channel state information," in Conf. Rec. 43rd Asilomar Signals, Syst. Comput., 2009, pp. 824-828.
-
(2009)
Conf. Rec. 43rd Asilomar Signals, Syst. Comput.
, pp. 824-828
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
21
-
-
84866730731
-
Energy efficiency of cooperative jamming strategies in secure wireless networks
-
Sep.
-
M. Dehghan, D. L. Goeckel, M. Ghaderi, and Z. Ding, "Energy efficiency of cooperative jamming strategies in secure wireless networks," IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sep. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.9
, pp. 3025-3029
-
-
Dehghan, M.1
Goeckel, D.L.2
Ghaderi, M.3
Ding, Z.4
-
22
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
Oct.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
23
-
-
67650239840
-
Resource allocation for the wire-tap multicarrier broadcast channel
-
E. A. Jorswieck and A. Wolf, "Resource allocation for the wire-tap multicarrier broadcast channel," in Proc. ICT, 2008, pp. 1-6.
-
(2008)
Proc. ICT
, pp. 1-6
-
-
Jorswieck, E.A.1
Wolf, A.2
-
24
-
-
77955366092
-
Collaborative relay beamforming for secrecy
-
J. Zhang and M. C. Gursoy, "Collaborative relay beamforming for secrecy," in Proc. IEEE ICC, 2010, pp. 1-5.
-
(2010)
Proc. IEEE ICC
, pp. 1-5
-
-
Zhang, J.1
Gursoy, M.C.2
-
25
-
-
70449514539
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
P. C. Pinto, J. Barros, and M. Z. Win, "Wireless physical-layer security: The case of colluding eavesdroppers," in Proc. IEEE ISIT, 2009, pp. 2442-2446.
-
(2009)
Proc. IEEE ISIT
, pp. 2442-2446
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
26
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
27
-
-
84855911932
-
Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 139-147
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
28
-
-
77954453442
-
On the effect of colluding eavesdroppers on secrecy capacity scaling
-
O. O. Koyluoglu, C. E. Koksal, and H. El Gamal, "On the effect of colluding eavesdroppers on secrecy capacity scaling," in Proc. EW Conf., 2010, pp. 790-795.
-
(2010)
Proc. EW Conf.
, pp. 790-795
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
El Gamal, H.3
-
29
-
-
80051775150
-
Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
-
Sep.
-
X. Wang, M. Tao, J. Mo, and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 693-702, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 693-702
-
-
Wang, X.1
Tao, M.2
Mo, J.3
Xu, Y.4
-
30
-
-
14044264157
-
A vectorperturbation technique for near-capacity multiantenna multiuser communication-Part I: Channel inversion and regularization
-
Jan.
-
C. B. Peel, B. M. Hochwald, and A. L. Swindlehurst, "A vectorperturbation technique for near-capacity multiantenna multiuser communication-Part I: Channel inversion and regularization," IEEE Trans. Commun., vol. 53, no. 1, pp. 195-202, Jan. 2005.
-
(2005)
IEEE Trans. Commun.
, vol.53
, Issue.1
, pp. 195-202
-
-
Peel, C.B.1
Hochwald, B.M.2
Swindlehurst, A.L.3
-
31
-
-
0000893073
-
Optimal downlink beamforming using semidefinite optimization
-
M. Bengtsson and B. Ottersten, "Optimal downlink beamforming using semidefinite optimization," in Proc. 37th Annu. Allerton Conf. Commun., Control, Comput., 1999, pp. 987-996.
-
(1999)
Proc. 37th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 987-996
-
-
Bengtsson, M.1
Ottersten, B.2
-
32
-
-
0032183287
-
Transmit beamforming and power control for cellular wireless systems
-
Oct.
-
F. Rashid-Farrokhi, K. R. Liu, and L. Tassiulas, "Transmit beamforming and power control for cellular wireless systems," IEEE J. Sel. Areas Commun., vol. 16, no. 8, pp. 1437-1450, Oct. 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.8
, pp. 1437-1450
-
-
Rashid-Farrokhi, F.1
Liu, K.R.2
Tassiulas, L.3
-
33
-
-
30344463816
-
Linear precoding via conic optimization for fixed MIMO receivers
-
Jan.
-
A. Wiesel, Y. C. Eldar, and S. Shamai, "Linear precoding via conic optimization for fixed MIMO receivers," IEEE Trans. Signal Process., vol. 54, no. 1, pp. 161-176, Jan. 2006.
-
(2006)
IEEE Trans. Signal Process.
, vol.54
, Issue.1
, pp. 161-176
-
-
Wiesel, A.1
Eldar, Y.C.2
Shamai, S.3
-
34
-
-
0031636943
-
Optimal downlink power assignment for smart antenna systems
-
W. Yang and G. Xu, "Optimal downlink power assignment for smart antenna systems," in Proc. IEEE IEEE Int. Conf. Acoust., Speech, Signal Process., 1998, vol. 6, pp. 3337-3340.
-
(1998)
Proc. IEEE IEEE Int. Conf. Acoust., Speech, Signal Process.
, vol.6
, pp. 3337-3340
-
-
Yang, W.1
Xu, G.2
-
35
-
-
1242330923
-
Solution of the multiuser downlink beamforming problem with individual SINR constraints
-
Jan.
-
M. Schubert and H. Boche, "Solution of the multiuser downlink beamforming problem with individual SINR constraints," IEEE Trans. Veh. Technol., vol. 53, no. 1, pp. 18-28, Jan. 2004.
-
(2004)
IEEE Trans. Veh. Technol.
, vol.53
, Issue.1
, pp. 18-28
-
-
Schubert, M.1
Boche, H.2
-
36
-
-
23844543377
-
Iterative multiuser uplink and downlink beamforming under SINR constraints
-
Jul.
-
M. Schubert and H. Boche, "Iterative multiuser uplink and downlink beamforming under SINR constraints," IEEE Trans. Signal Process., vol. 53, no. 7, pp. 2324-2334, Jul. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.7
, pp. 2324-2334
-
-
Schubert, M.1
Boche, H.2
-
37
-
-
1242308504
-
Iterative water-filling for Gaussian vector multiple-access channels
-
Jan.
-
W. Yu, W. Rhee, S. Boyd, and J. M. Cioffi, "Iterative water-filling for Gaussian vector multiple-access channels," IEEE Trans. Inf. Theory, vol. 50, no. 1, pp. 145-152, Jan. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.1
, pp. 145-152
-
-
Yu, W.1
Rhee, W.2
Boyd, S.3
Cioffi, J.M.4
-
38
-
-
34250692167
-
Joint source and relay optimization for a non-regenerative MIMO relay
-
Z. Fang, Y. Hua, and J. C. Koshy, "Joint source and relay optimization for a non-regenerative MIMO relay," in Proc. 4th IEEE Workshop Sensor Array Multichannel Process., 2006, pp. 239-243.
-
(2006)
Proc. 4th IEEE Workshop Sensor Array Multichannel Process
, pp. 239-243
-
-
Fang, Z.1
Hua, Y.2
Koshy, J.C.3
-
39
-
-
70350614556
-
Precoder design for non-regenerative MIMO relay systems
-
Oct.
-
R. Mo and Y. Chew, "Precoder design for non-regenerative MIMO relay systems," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5041-5049, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5041-5049
-
-
Mo, R.1
Chew, Y.2
-
40
-
-
77249142926
-
Linear MMSE transceiver design in amplifyand-forward MIMO relay systems
-
Feb.
-
F.-S. Tseng and W.-R. Wu, "Linear MMSE transceiver design in amplifyand-forward MIMO relay systems," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 754-765, Feb. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.2
, pp. 754-765
-
-
Tseng, F.-S.1
Wu, W.-R.2
|