-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
3
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
4
-
-
39049130758
-
Generalized multiple access channels with confidential messages
-
Seattle, WA, USA, Jul.
-
Y. Liang and H. V. Poor, "Generalized multiple access channels with confidential messages," in Proc. IEEE ISIT, Seattle, WA, USA, Jul. 2006, pp. 952-956.
-
(2006)
Proc. IEEE ISIT
, pp. 952-956
-
-
Liang, Y.1
Poor, H.V.2
-
5
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
6
-
-
84905215997
-
On the performance of full-duplex relaying under phy security constraints
-
Florence, Italy, May
-
H. Alves, G. Brante, R. Demo Souza, D. B. d. Costa, and M. Latvaaho, "On the performance of full-duplex relaying under phy security constraints," in Proc. IEEE ICASSP, Florence, Italy, May 2014, pp. 3978-3981.
-
(2014)
Proc. IEEE ICASSP
, pp. 3978-3981
-
-
Alves, H.1
Brante, G.2
Demo Souza, R.3
Costa, D.B.D.4
Latvaaho, M.5
-
7
-
-
84931425598
-
Secret communication using artificial noise
-
Dallas, TX, USA, Sep. 3
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE VTC'05, Dallas, TX, USA, Sep. 3, 2005, vol. 3, pp. 1906-1910.
-
(2005)
Proc. IEEE VTC'05
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
8
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
9
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.L.2
-
10
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr.
-
S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forenics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012.
-
(2012)
IEEE Trans. Inf. Forenics Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.A.3
-
11
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
Oct.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
12
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S.Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
13
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L. C. Choo, and K. K.Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.C.2
Wong, K.K.3
-
14
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
-
Mar.
-
W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.C.1
Chang, T.H.2
Ma, W.K.3
Chi, C.Y.4
-
15
-
-
84857366666
-
Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI
-
Feb.
-
M. Pei, J. Wei, K. K. Wong, and X. Wang, "Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 544-549, Feb. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.2
, pp. 544-549
-
-
Pei, M.1
Wei, J.2
Wong, K.K.3
Wang, X.4
-
16
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
-
May
-
Q. Li and W. K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.K.2
-
17
-
-
84867873837
-
Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
-
Oct.
-
W. Li,M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.10
, pp. 1628-1631
-
-
Li, W.1
Ghogho, M.2
Chen, B.3
Xiong, C.4
-
18
-
-
84883785476
-
Improving physical layer secrecy using full-duplex jamming receivers
-
Oct.
-
G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers," IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962-4974,Oct. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.20
, pp. 4962-4974
-
-
Zheng, G.1
Krikidis, I.2
Li, J.3
Petropulu, A.P.4
Ottersten, B.5
-
19
-
-
77954833497
-
Co-channel interference cancellation using single radio frequency and baseband chain
-
Jul.
-
S. W. Kim, Y. J. Chun, and S. Kim, "Co-channel interference cancellation using single radio frequency and baseband chain," IEEE Trans. Commun., vol. 58, no. 7, pp. 2169-2175, Jul. 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.7
, pp. 2169-2175
-
-
Kim, S.W.1
Chun, Y.J.2
Kim, S.3
-
20
-
-
81455148096
-
Mitigation of loopback self-interference in full-duplex MIMO relays
-
Dec.
-
T. Riihonen, S. Werner, and R. Wichman, "Mitigation of loopback self-interference in full-duplex MIMO relays," IEEE Trans. Signal Process., vol. 59, no. 12, pp. 5983-5993, Dec. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.12
, pp. 5983-5993
-
-
Riihonen, T.1
Werner, S.2
Wichman, R.3
-
21
-
-
80053601254
-
Practical, real-time, full duplex wireless
-
Las Vegas, Nevada, USA
-
M. Jain, J. I. Choi, and T. Kim, "Practical, real-time, full duplex wireless," in The MobiCom, Las Vegas, Nevada, USA, 2011.
-
(2011)
The MobiCom
-
-
Jain, M.1
Choi, J.I.2
Kim, T.3
-
22
-
-
65749120701
-
Degrees of freedom of wireless networks with relays, feedback, cooperation, and full duplex operation
-
May
-
V. R. Cadambe and S. A. Jafar, "Degrees of freedom of wireless networks with relays, feedback, cooperation, and full duplex operation," IEEE Trans. Inf. Theory, vol. 55, no. 5, pp. 2334-2344, May 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.5
, pp. 2334-2344
-
-
Cadambe, V.R.1
Jafar, S.A.2
-
23
-
-
73449140803
-
Catching resource-devouring worms in next-generation wireless relay systems: Two-way relay and full-duplex relay
-
Sep.
-
H. Ju, E. Oh, and D. Hong, "Catching resource-devouring worms in next-generation wireless relay systems: two-way relay and full-duplex relay," IEEE Commun. Mag., vol. 47, no. 9, pp. 58-65, Sep. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.9
, pp. 58-65
-
-
Ju, H.1
Oh, E.2
Hong, D.3
-
24
-
-
84862615319
-
Full-duplex MIMO relaying: Achievable rates under limited dynamic range
-
Sep.
-
B. P. Day, A. R. Margetts, D. W. Bliss, and P. Schniter, "Full-duplex MIMO relaying: achievable rates under limited dynamic range," IEEE J. Sel. Areas Commun., vol. 30, no. 8, pp. 1541-1553, Sep. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.8
, pp. 1541-1553
-
-
Day, B.P.1
Margetts, A.R.2
Bliss, D.W.3
Schniter, P.4
-
25
-
-
84873090306
-
Anti-jamming message-driven frequency hopping-part I: System design
-
Jan.
-
L. Zhang, H. Wang, and T. Li, "Anti-jamming message-driven frequency hopping-part I: System design," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 70-79, Jan. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 70-79
-
-
Zhang, L.1
Wang, H.2
Li, T.3
-
26
-
-
84873084264
-
Anti-jamming message-driven frequency hopping- part II: Capacity analysis under disguised jamming
-
Jan.
-
L. Zhang and T. Li, "Anti-jamming message-driven frequency hopping- part II: capacity analysis under disguised jamming," IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 80-88, Jan. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 80-88
-
-
Zhang, L.1
Li, T.2
-
27
-
-
45249101530
-
The general Gaussian multiple-access and two-waywiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and two-waywiretap channels: achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
28
-
-
0000261286
-
Programming with linear fractional functionals
-
Dec.
-
A. Charnes and W. W. Cooper, "Programming with linear fractional functionals," Naval Res. Logist. Quarter., vol. 9, no. 3-4, pp. 181-186, Dec. 1962.
-
(1962)
Naval Res. Logist. Quarter.
, vol.9
, Issue.3-4
, pp. 181-186
-
-
Charnes, A.1
Cooper, W.W.2
-
29
-
-
85032752455
-
Semidefinite relaxation of quadratic optimization problems
-
May
-
Z. Q. Luo, W. K. Ma, A. M. C. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, May 2010.
-
(2010)
IEEE Signal Process. Mag.
, vol.27
, Issue.3
, pp. 20-34
-
-
Luo, Z.Q.1
Ma, W.K.2
So, A.M.C.3
Ye, Y.4
Zhang, S.5
|