-
1
-
-
68349116049
-
Information theoretic security
-
Shitz
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security," Foundations Trends Commun. Inf. Theory , vol. 5, no. 4-5, pp. 355-580, 2008.
-
(2008)
Foundations Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
2
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
3
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
6
-
-
80054058314
-
Optimal power allocation for secure multicarrier relay systems
-
Nov.
-
C. Jeong and I.-M. Kim, "Optimal power allocation for secure multicarrier relay systems," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.11
, pp. 5428-5442
-
-
Jeong, C.1
Kim, I.-M.2
-
7
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
8
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
9
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
10
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan.
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.C.5
-
11
-
-
84883052221
-
An effective secure transmission scheme for AF relay networks with two-hop information leakage
-
Aug.
-
M. Lin, J. Ge, and Y. Yang, "An effective secure transmission scheme for AF relay networks with two-hop information leakage," IEEE Commun. Lett., vol. 17, no. 8, pp. 1676-1679, Aug. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.8
, pp. 1676-1679
-
-
Lin, M.1
Ge, J.2
Yang, Y.3
-
12
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
13
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Apr.
-
Y. Liu, J. Li, and A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-694, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 682-694
-
-
Liu, Y.1
Li, J.2
Petropulu, A.P.3
-
14
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun. , vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
15
-
-
84874906565
-
Deaf cooperation and relay selection strategies for secure communication in multiple relay networks
-
Mar. 15
-
R. Bassily and S. Ulukus, "Deaf cooperation and relay selection strategies for secure communication in multiple relay networks," IEEE Trans. Signal Process., vol. 61, no. 6, pp. 1544-1554, Mar. 15, 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.6
, pp. 1544-1554
-
-
Bassily, R.1
Ulukus, S.2
-
16
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
17
-
-
84885820885
-
Optimal joint cooperative beamforming and artificial noise design for secrecy rate maximization in AF relay networks
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and M. Lin, "Optimal joint cooperative beamforming and artificial noise design for secrecy rate maximization in AF relay networks," in Proc. IEEE Signal Process. Adv. Wireless Commun. (SPAWC), Jun. 2013, pp. 1-5.
-
Proc. IEEE Signal Process. Adv. Wireless Commun. (SPAWC), Jun. 2013
, pp. 1-5
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Lin, M.5
-
18
-
-
84879149313
-
Secure relay beamforming with imperfect channel state information
-
Jun.
-
X. Wang, K. Wang, and X.-D. Zhang, "Secure relay beamforming with imperfect channel state information," IEEE Trans. Veh. Tech. , vol. 62, no. 5, pp. 2140-2155, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Tech.
, vol.62
, Issue.5
, pp. 2140-2155
-
-
Wang, X.1
Wang, K.2
Zhang, X.-D.3
-
19
-
-
84891354137
-
Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI
-
S. Vishwakarma and A. Chockalingam, "Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI," in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2013, pp. 1640-1645.
-
Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2013
, pp. 1640-1645
-
-
Vishwakarma, S.1
Chockalingam, A.2
-
20
-
-
84870499401
-
A general relaying transmission protocol for MIMO secrecy communications
-
Nov.
-
Z. Ding, M. Peng, and H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.3
-
21
-
-
84871528743
-
Using simple relays to improve physical layer security
-
G. Zheng, J. Li, K.-K. Wong, A. P. Petropulu, and B. Ottersten, "Using simple relays to improve physical layer security," in Proc. Int. Conf. Commun. China (ICCC2012), Aug. 15-18, 2012.
-
Proc. Int. Conf. Commun. China (ICCC2012), Aug. 15-18, 2012
-
-
Zheng, G.1
Li, J.2
Wong, K.-K.3
Petropulu, A.P.4
Ottersten, B.5
-
22
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
23
-
-
84883395356
-
Transmit solutions for MIMO wiretap channels using alternating optimization
-
Sep.
-
Q. Li, M. Hong, H.-T. Wai, Y.-F. Liu, W.-K. Ma, and Z.-Q. Luo, "Transmit solutions for MIMO wiretap channels using alternating optimization," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1714-1727, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1714-1727
-
-
Li, Q.1
Hong, M.2
Wai, H.-T.3
Liu, Y.-F.4
Ma, W.-K.5
Luo, Z.-Q.6
-
24
-
-
84903554995
-
Secrecy rate optimizations for a MIMOsecrecy channel with amultiple-antenna eavesdropper
-
May
-
K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, "Secrecy rate optimizations for a MIMOsecrecy channel with amultiple-antenna eavesdropper," IEEE Trans. Veh. Tech., vol. 63, no. 4, pp. 1678-1689, May 2014.
-
(2014)
IEEE Trans. Veh. Tech.
, vol.63
, Issue.4
, pp. 1678-1689
-
-
Cumanan, K.1
Ding, Z.2
Sharif, B.3
Tian, G.Y.4
Leung, K.K.5
-
25
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization
-
May 15
-
Q. Li and W.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 15, 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.-K.2
-
26
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
27
-
-
77951274829
-
Secure communication over MISO cognitive radio channels
-
Apr.
-
Y. Pei, Y.-C. Liang, L. Zhang, K. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.4
, pp. 1494-1502
-
-
Pei, Y.1
Liang, Y.-C.2
Zhang, L.3
Teh, K.4
Li, K.H.5
-
28
-
-
77954584443
-
Multiuser MISO transmitter optimization for intercell interference mitigation
-
Aug.
-
H. Huh, H. C. Papadopoulos, and G. Caire, "Multiuser MISO transmitter optimization for intercell interference mitigation," IEEE Trans. Signal Process. , vol. 58, no. 8, pp. 4272-4285, Aug. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.8
, pp. 4272-4285
-
-
Huh, H.1
Papadopoulos, H.C.2
Caire, G.3
-
29
-
-
67650355939
-
-
Philadelphia, PA, USA: SIAM
-
A. R. Conn, K. Scheinberg, and L. N. Vicente, Introduction to derivative-free optimization. Philadelphia, PA, USA: SIAM, 2009.
-
(2009)
Introduction to Derivative-free Optimization
-
-
Conn, A.R.1
Scheinberg, K.2
Vicente, L.N.3
-
31
-
-
85032752455
-
Semidefinite relaxation of quadratic optimization problems
-
May
-
Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Process. Mag. , vol. 27, no. 3, pp. 20-34, May 2010.
-
(2010)
IEEE Signal Process. Mag.
, vol.27
, Issue.3
, pp. 20-34
-
-
Luo, Z.-Q.1
Ma, W.-K.2
So, A.M.-C.3
Ye, Y.4
Zhang, S.5
-
32
-
-
9944244703
-
Multivariate nonnegative quadratic mappings
-
Z.-Q. Luo, J. F. Sturm, and S. Zhang, "Multivariate nonnegative quadratic mappings," SIAM J. Optimiz., vol. 14, no. 4, pp. 1140-1162, 2004.
-
(2004)
SIAM J. Optimiz.
, vol.14
, Issue.4
, pp. 1140-1162
-
-
Luo, Z.-Q.1
Sturm, J.F.2
Zhang, S.3
-
33
-
-
0000261286
-
Programming with linear fractional functionals
-
Dec.
-
A. Charnes and W. W. Cooper, "Programming with linear fractional functionals," Naval Res. Logist. Quart., vol. 9, pp. 181-186, Dec. 1962.
-
(1962)
Naval Res. Logist. Quart.
, vol.9
, pp. 181-186
-
-
Charnes, A.1
Cooper, W.W.2
-
34
-
-
0003878614
-
-
Philadelphia, PA, USA: SIAM
-
A. Ben-Tal and A. Nemirovski, Lectures on modern convex optimization: Analysis, algorithms, engineering applications. Philadelphia, PA, USA: SIAM, 2001.
-
(2001)
Lectures on Modern Convex Optimization: Analysis, Algorithms, Engineering Applications
-
-
Ben-Tal, A.1
Nemirovski, A.2
-
35
-
-
0033296299
-
Using SeDuMi 1.02, A Matlab toolbox for optimization over symmetric cones
-
[Online]. Available Oct. 2004
-
J. Sturm, "Using SeDuMi 1.02, A Matlab toolbox for optimization over symmetric cones," Optimiz. Methods Software, vol. 11 (1-4), pp. 625-653, 1999 [Online]. Available: http://sedumi.ie.lehigh.edu/, Oct. 2004
-
(1999)
Optimiz. Methods Software
, vol.11
, Issue.1-4
, pp. 625-653
-
-
Sturm, J.1
-
36
-
-
67650165289
-
MIMOrelay design for multipoint-tomultipoint communications with imperfect channel state information
-
Jul.
-
B. Chalise and L. Vandendorpe, "MIMOrelay design for multipoint-tomultipoint communications with imperfect channel state information," IEEE Trans. Signal Process., vol. 57, no. 7, pp. 2785-2796, Jul. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.7
, pp. 2785-2796
-
-
Chalise, B.1
Vandendorpe, L.2
|