-
1
-
-
79955491895
-
Interference assisted secret communication
-
May
-
X. Tang, R. Liu, P. Spasojević, and H. V. Poor, "Interference assisted secret communication," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 3153-3167, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 3153-3167
-
-
Tang, X.1
Liu, R.2
Spasojević, P.3
Poor, H.V.4
-
2
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
3
-
-
45249119255
-
Secure communication over fading channels
-
Jun.
-
Y. Liang, H. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
4
-
-
77958560746
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G.W. Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
5
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
6
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Feb.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
7
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr.
-
J. Huang and L. A. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1702, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1696-1702
-
-
Huang, J.1
Swindlehurst, L.A.2
-
8
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
9
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
10
-
-
80054062591
-
Impact of imperfect channel state information on bi-directional communications with relay selection
-
Nov.
-
Z. Ding and K. K. Leung, "Impact of imperfect channel state information on bi-directional communications with relay selection," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5657-5662, Nov. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.11
, pp. 5657-5662
-
-
Ding, Z.1
Leung, K.K.2
-
11
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
12
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
-
May
-
Q. Li and W.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.-K.2
-
14
-
-
84877752784
-
Full rank solutions for the MIMO gaussian wiretap channel with an average power constraint
-
May
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2620-2631
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
15
-
-
70349682785
-
Robust interference control techniques for multi-user cognitive radios using worstcase performance optimization
-
Pacific Grove, CA, USA, Oct.
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "Robust interference control techniques for multi-user cognitive radios using worstcase performance optimization," in Proc. Asilomar Conf. Signal, Syst. Comput., Pacific Grove, CA, USA, Oct. 2008, pp. 378-382.
-
(2008)
Proc. Asilomar Conf. Signal, Syst. Comput.
, pp. 378-382
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
16
-
-
67549134798
-
A robust beamforming based interference control technique and its performance for cognitive radios
-
Oct.
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "A robust beamforming based interference control technique and its performance for cognitive radios," in Proc. ISCIT, Oct. 2008, pp. 9-13.
-
(2008)
Proc. ISCIT
, pp. 9-13
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
17
-
-
77951114748
-
Robust interference control techniques for cognitive radios using worst-case performance optimization
-
Auckland, New Zealand, Dec.
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "Robust interference control techniques for cognitive radios using worst-case performance optimization," in Proc. ISITA, Auckland, New Zealand, Dec. 2008, pp. 1-5.
-
(2008)
Proc. ISITA
, pp. 1-5
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
18
-
-
67650663170
-
Energy-efficient multiuser SIMO: Achieving probabilistic robustness with gaussian channel uncertainty
-
Jun.
-
G. Zheng, K.-K. Wong, and T.-S. Ng, "Energy-efficient multiuser SIMO: Achieving probabilistic robustness with Gaussian channel uncertainty," IEEE Trans. Commun., vol. 57, no. 6, pp. 1866-1878, Jun. 2009.
-
(2009)
IEEE Trans. Commun.
, vol.57
, Issue.6
, pp. 1866-1878
-
-
Zheng, G.1
Wong, K.-K.2
Ng, T.-S.3
-
19
-
-
70450284436
-
Robust cognitive beamforming with bounded channel uncertainties
-
Dec.
-
G. Zheng, K.-K. Wong, and B. Ottersten, "Robust cognitive beamforming with bounded channel uncertainties," IEEE Trans. Signal Process., vol. 57, no. 12, pp. 4871-4881, Dec. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.12
, pp. 4871-4881
-
-
Zheng, G.1
Wong, K.-K.2
Ottersten, B.3
-
20
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
21
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan.
-
A. Mukherjee and L. A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, L.A.2
-
22
-
-
84903554995
-
Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper
-
May
-
K. Cumanan, Z. Ding, B. Sharif, G. Tian, and K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.4
, pp. 1678-1690
-
-
Cumanan, K.1
Ding, Z.2
Sharif, B.3
Tian, G.4
Leung, K.5
-
23
-
-
84926132556
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
Z. Han, D. Niyato, and W. Saad, Game Theory in Wireless and Communication Networks: Theory, Models, and Applications. Cambridge, U.K.: Cambridge Univ. Press, 2011.
-
(2011)
Game Theory in Wireless and Communication Networks: Theory, Models, and Applications
-
-
Han, Z.1
Niyato, D.2
Saad, W.3
-
24
-
-
80051757604
-
An information secrecy game in cognitive radio networks
-
Sep.
-
Y. Wu and K. Liu, "An information secrecy game in cognitive radio networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 831-842, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 831-842
-
-
Wu, Y.1
Liu, K.2
-
25
-
-
84867619190
-
Detecting passive eavesdroppers in the MIMO wiretap channel
-
Tokyo, Japan, Mar.
-
A. Mukherjee and A. Swindlehurst, "Detecting passive eavesdroppers in the MIMO wiretap channel," in Proc. IEEE ICASSP, Tokyo, Japan, Mar. 2012, pp. 2809-2812.
-
(2012)
Proc. IEEE ICASSP
, pp. 2809-2812
-
-
Mukherjee, A.1
Swindlehurst, A.2
-
28
-
-
0037304809
-
Robust adaptive beamforming using worst-case performance optimization: A solution to the signal mismatch problem
-
Feb.
-
S. Vorobyov, A. Gershman, and Z.-Q. Luo, "Robust adaptive beamforming using worst-case performance optimization: A solution to the signal mismatch problem," IEEE Trans. Signal Process., vol. 51, no. 2, pp. 313-324, Feb. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.2
, pp. 313-324
-
-
Vorobyov, S.1
Gershman, A.2
Luo, Z.-Q.3
-
30
-
-
80052913251
-
Solutions for the MIMO gaussian wiretap channel with a cooperative jammer
-
Oct.
-
S. Fakoorian and A. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.1
Swindlehurst, A.2
-
31
-
-
84861194117
-
A new design paradigm for MIMO cognitive radio with primary user rate constraint
-
May
-
K. Cumanan, R. Zhang, and S. Lambotharan, "A new design paradigm for MIMO cognitive radio with primary user rate constraint," IEEE Commun. Lett., vol. 16, no. 5, pp. 706-709, May 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.5
, pp. 706-709
-
-
Cumanan, K.1
Zhang, R.2
Lambotharan, S.3
-
32
-
-
0003595806
-
-
Philadelphia, PA, USA: SIAM
-
S. Boyd, L. E. Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequalities in System and Control Theory, Studies in Applied Mathematics. Philadelphia, PA, USA: SIAM, 1994.
-
(1994)
Linear Matrix Inequalities in System and Control Theory, Studies in Applied Mathematics
-
-
Boyd, S.1
Ghaoui, L.E.2
Feron, E.3
Balakrishnan, V.4
|