-
1
-
-
67349259569
-
Breaking spectrum gridlock with cognitive radios: An information theoretic perspective
-
May
-
A. Goldsmith, S. Jafar, I. Maric, and S. Srinivasa, "Breaking spectrum gridlock with cognitive radios: An information theoretic perspective," Proc. IEEE, vol. 97, no. 5, pp. 894-914, May 2009.
-
(2009)
Proc. IEEE
, vol.97
, Issue.5
, pp. 894-914
-
-
Goldsmith, A.1
Jafar, S.2
Maric, I.3
Srinivasa, S.4
-
2
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
85032751776
-
Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Sep.
-
Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.-W.P.1
Lan, P.-C.2
Kuo, C.-C.J.3
-
4
-
-
85032751357
-
Cooperative security at the physical layer: A summary of recent advances
-
Sep.
-
R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 16-28
-
-
Bassily, R.1
-
5
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
6
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
7
-
-
84870512709
-
Joint cooperative Beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative Beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
8
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
9
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 61, no. 5, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.61
, Issue.5
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
10
-
-
84904282993
-
Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks
-
Aug.
-
H.-M. Wang, F. Liu, and X.-G. Xia, "Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240-1250, Aug. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.8
, pp. 1240-1250
-
-
Wang, H.-M.1
Liu, F.2
Xia, X.-G.3
-
11
-
-
84907557424
-
Robust joint beamforming and jamming for secure AF networks: Low complexity design
-
to be published
-
C. Wang and H.-M. Wang, "Robust joint beamforming and jamming for secure AF networks: Low complexity design," IEEE Trans. Veh. Technol., to be published.
-
IEEE Trans. Veh. Technol.
-
-
Wang, C.1
Wang, H.-M.2
-
12
-
-
84907557423
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
to be published
-
C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., to be published.
-
IEEE Trans. Wireless Commun.
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
13
-
-
80051757604
-
An information secrecy game in cognitive radio networks
-
Sep.
-
Y. Wu and K. J. R. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 831-842
-
-
Wu, Y.1
Liu, K.J.R.2
-
14
-
-
84873097542
-
Improving secrecy rate via spectrum leasing for friendly jamming
-
Jan.
-
I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-135, Jan. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 134-135
-
-
Stanojev, I.1
Yener, A.2
-
15
-
-
84886662535
-
Cooperative spectrum access towards secure information transfer for CRNs
-
Nov.
-
N. Zhang, N. Lu, N. Cheng, J. W. Mark, and X. Shen, "Cooperative spectrum access towards secure information transfer for CRNs," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 2453-2464, Nov. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 2453-2464
-
-
Zhang, N.1
Lu, N.2
Cheng, N.3
Mark, J.W.4
Shen, X.5
-
16
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec.
-
Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
17
-
-
4444219556
-
-
IEEE P802.22/D1.0 Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands, 22, Apr.
-
IEEE P802.22/D1.0 Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands, IEEE Standard 802.22, Apr. 2008.
-
(2008)
IEEE Standard
, vol.802
-
-
-
18
-
-
84877644812
-
Secure MISO cognitive radio system with perfect and imperfect CSI
-
Dec.
-
T. Kwon, V. W. S. Wong, and R. Schober, "Secure MISO cognitive radio system with perfect and imperfect CSI," in Proc. IEEE Int. Conf. Commun. (ICC), Dec. 2012, pp. 1236-1241.
-
(2012)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 1236-1241
-
-
Kwon, T.1
Wong, V.W.S.2
Schober, R.3
-
19
-
-
79952680469
-
Secure communication in multiantenna cognitive radio networks with imperfect channel state information
-
Apr.
-
Y. Pei, Y.-C. Liang, K. C. Teh, and K. H. Li, "Secure communication in multiantenna cognitive radio networks with imperfect channel state information," IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1683-1693, Apr. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.4
, pp. 1683-1693
-
-
Pei, Y.1
Liang, Y.-C.2
Teh, K.C.3
Li, K.H.4
-
20
-
-
77951274829
-
Secure communication over MISO cognitive radio channels
-
Apr.
-
Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.4
, pp. 1494-1502
-
-
Pei, Y.1
Liang, Y.-C.2
Zhang, L.3
Teh, K.C.4
Li, K.H.5
-
21
-
-
70350577319
-
-
Ph.D. dissertation, Dept. Electr. Comput. Eng., Univ. Texas at Austin, Austin, TX, USA
-
V. Chandrasekhar, "Coexistence in femtocell-aided cellular architectures," Ph.D. dissertation, Dept. Electr. Comput. Eng., Univ. Texas at Austin, Austin, TX, USA, 2009.
-
(2009)
Coexistence in Femtocell-aided Cellular Architectures
-
-
Chandrasekhar, V.1
-
22
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
23
-
-
79952706123
-
Rethinking the secrecy outage formulation: A secure transmission design perspective
-
Mar.
-
X. Zhou, M. R. McKay, B. Maham, and A. Hjrungnes, "Rethinking the secrecy outage formulation: A secure transmission design perspective," IEEE Commun. Lett., vol. 15, no. 3, pp. 302-304, Mar. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.3
, pp. 302-304
-
-
Zhou, X.1
McKay, M.R.2
Maham, B.3
Hjrungnes, A.4
-
24
-
-
84879203277
-
On the design of artificialnoise- aided secure multi-antenna transmission in slow fading channels
-
Jun.
-
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificialnoise- aided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
25
-
-
84907557422
-
Robust multiple antenna cooperative spectrum sharing design with random vector quantization
-
to be published
-
F.-S. Tseng and C.-Y. Hsu, "Robust multiple antenna cooperative spectrum sharing design with random vector quantization," IEEE Trans. Veh. Technol., to be published. [Online]. Available http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6697840
-
IEEE Trans. Veh. Technol.
-
-
Tseng, F.-S.1
Hsu, C.-Y.2
-
26
-
-
40849136148
-
Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks
-
Feb.
-
R. Zhang and Y.-C. Liang, "Exploiting multi-antennas for opportunistic spectrum sharing in cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 2, no. 1, pp. 88-102, Feb. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.2
, Issue.1
, pp. 88-102
-
-
Zhang, R.1
Liang, Y.-C.2
-
27
-
-
84860213891
-
Orthogonal transmissions for spectrum underlay MISO cognitive radio
-
Apr.
-
H. Guo and V. C. M. Leung, "Orthogonal transmissions for spectrum underlay MISO cognitive radio," IEEE Trans. Wireless Commun., vol. 11, no. 4, pp. 1266-1270, Apr. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.4
, pp. 1266-1270
-
-
Guo, H.1
Leung, V.C.M.2
-
28
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Jun.
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian MISO channels with secrecy constraints," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2007, pp. 2466-2470.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 2466-2470
-
-
Shafiee, S.1
Ulukus, S.2
-
30
-
-
84893431203
-
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
-
Feb.
-
M. Pei, A. L. Swindlehurst, D. Ma, and J. Wei, "Adaptive limited feedback for MISO wiretap channels with cooperative jamming," IEEE Trans. Signal Process, vol. 62, no. 4, pp. 993-1004, Feb. 2014.
-
(2014)
IEEE Trans. Signal Process
, vol.62
, Issue.4
, pp. 993-1004
-
-
Pei, M.1
Swindlehurst, A.L.2
Ma, D.3
Wei, J.4
-
31
-
-
77954499023
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
F. W. J. Olver, D. W. Lozier, R. F. Boisvert, and C. W. Clark, NIST Handbook of Mathematical Functions. Cambridge, U.K.: Cambridge Univ. Press, 2010.
-
(2010)
NIST Handbook of Mathematical Functions
-
-
Olver, F.W.J.1
Lozier, D.W.2
Boisvert, R.F.3
Clark, C.W.4
-
32
-
-
0003498504
-
-
7th ed. New York, NY, USA: Academic
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
35
-
-
85032752174
-
Scaling up MIMO: Opportunities and challenges with very large arrays
-
Jan.
-
F. Rusek et al., "Scaling up MIMO: Opportunities and challenges with very large arrays," IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40-60, Jan. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.1
, pp. 40-60
-
-
Rusek, F.1
-
36
-
-
84896823919
-
Massive MIMO for next generation wireless systems
-
Feb.
-
E. Larsson, O. Edfors, F. Tufvesson, and T. L. Marzetta, "Massive MIMO for next generation wireless systems," IEEE Commun. Mag., vol. 52, no. 2, pp. 186-195, Feb. 2014. [Online]. Available: http://arxiv.org/pdf/1304.6690v3.pdf
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.2
, pp. 186-195
-
-
Larsson, E.1
Edfors, O.2
Tufvesson, F.3
Marzetta, T.L.4
-
37
-
-
84867511032
-
The topological proof of Abel-Ruffini theorem
-
Jun.
-
H. Zöladek, "The topological proof of Abel-Ruffini theorem," J. Juliusz Schauder Center, vol. 16, no. 6, pp. 253-265, Jun. 2000.
-
(2000)
J. Juliusz Schauder Center
, vol.16
, Issue.6
, pp. 253-265
-
-
Zöladek, H.1
|