-
1
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
2
-
-
80051779980
-
Secure communications over wireless broadcast networks: Stability and utility maximization
-
Sep.
-
Y. Liang, H. V. Poor, and L. Ying, "Secure communications over wireless broadcast networks: Stability and utility maximization," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 682-692, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 682-692
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
3
-
-
77958560746
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
4
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
5
-
-
80052889357
-
Cooperative jamming for secure communication in MIMO relay networks
-
Oct.
-
J. Huang and L. A. Swindlehurst, "Cooperative jamming for secure communication in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, L.A.2
-
6
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Feb.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
7
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach
-
Mar.
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
8
-
-
84903317482
-
Secure transmission with optimal power allocation in untrusted relay networks
-
Jun.
-
L. Wang, M. Elkashlan, J. Huang, N. Tran, and T. Duong, "Secure transmission with optimal power allocation in untrusted relay networks," IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
-
(2014)
IEEE Wireless Commun. Lett.
, vol.3
, Issue.3
, pp. 289-292
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
Tran, N.4
Duong, T.5
-
9
-
-
84893403880
-
Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
-
Feb.
-
L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.2
, pp. 247-258
-
-
Wang, L.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
-
10
-
-
67549134798
-
A robust beamforming based interference control technique and its performance for cognitive radios
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "A robust beamforming based interference control technique and its performance for cognitive radios," in Proc. ISCIT, Oct. 2008, pp. 9-13.
-
Proc. ISCIT, Oct.2008
, pp. 9-13
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
11
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
12
-
-
84903554995
-
Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper
-
May
-
K. Cumanan, Z. Ding, B. Sharif, G. Tian, and K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.4
, pp. 1678-1690
-
-
Cumanan, K.1
Ding, Z.2
Sharif, B.3
Tian, G.4
Leung, K.5
-
13
-
-
84903554995
-
Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
-
to be published
-
Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le Goff, "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer," IEEE Trans. Veh. Technol., 2014, to be published.
-
(2014)
IEEE Trans. Veh. Technol.
-
-
Chu, Z.1
Cumanan, K.2
Ding, Z.3
Johnston, M.4
Le Goff, S.5
-
15
-
-
84923852477
-
A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables
-
[Online]. Available
-
I. Bechar, "A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables," in Proc. Statist. Theory, 2009, pp. 1-6. [Online]. Available: http://arxiv.org/abs/0909.3595
-
Proc. Statist. Theory, 2009
, pp. 1-6
-
-
Bechar, I.1
|