-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Jul.
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels, " in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, USA, Jul. 2006, pp. 356-360.
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, USA
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
3
-
-
45249085230
-
Secret communication with a fading eavesdropper channel
-
Jul.
-
Z. Li, R. Yates, and W. Trappe, "Secret communication with a fading eavesdropper channel, " in Proc. IEEE Int. Symp. Inf. Theory, Nice, France, Jul. 2007, pp. 1296-1300.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory, Nice, France
, pp. 1296-1300
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
4
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. L. Y. Cheong and M. Hellman, "The Gaussian wire-tap channel, " IEEE Trans. Inf. Theory, vol. 26, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.26
, Issue.4
, pp. 451-456
-
-
Cheong, S.L.Y.1
Hellman, M.2
-
5
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay network
-
Oct.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay network, " IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
6
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel, " IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.2
-
7
-
-
77958560746
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. Wornell, "Secure transmission with multiple antennas II: TheMIMOME wiretap channel, " IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.2
-
8
-
-
84877752784
-
Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
-
May
-
S. A. A. Fakoorian and A. Lee Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint, " IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2620-2631
-
-
Fakoorian, S.A.A.1
Lee Swindlehurst, A.2
-
9
-
-
84903650326
-
On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks
-
Jul.
-
M. F. Hanif, L.-N. Tran, M. Juntti, and S. Glisic, "On linear precoding strategies for secrecy rate maximization in multiuser multiantenna wireless networks, " IEEE Trans. Signal Process., vol. 62, no. 14, pp. 3536-3551, Jul. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.14
, pp. 3536-3551
-
-
Hanif, M.F.1
Tran, L.-N.2
Juntti, M.3
Glisic, S.4
-
10
-
-
84857366311
-
Physical layer security in multibeam satellite systems
-
Feb.
-
G. Zheng, P. Arapoglou, and B. Ottersten, "Physical layer security in multibeam satellite systems, " IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 852-863, Feb. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.2
, pp. 852-863
-
-
Zheng, G.1
Arapoglou, P.2
Ottersten, B.3
-
11
-
-
84907533750
-
On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels
-
Nov.
-
C. Wang and H.-M. Wang, "On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1814-1827, Nov. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.11
, pp. 1814-1827
-
-
Wang, C.1
Wang, H.-M.2
-
12
-
-
85032751776
-
Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Sep.
-
Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches, " IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.-W.P.1
Lan, P.-C.2
Kuo, C.-C.J.3
-
13
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays, " IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
14
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security, " IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
15
-
-
84946240351
-
Robust joint beamforming and jamming for secure AF networks: Low complexity design
-
May
-
C. Wang and H.-M. Wang, "Robust joint beamforming and jamming for secure AF networks: Low complexity design, " IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.5
, pp. 2192-2198
-
-
Wang, C.1
Wang, H.-M.2
-
16
-
-
84933068238
-
Joint cooperative beamforming, jamming and power allocation to secure AF relay systems
-
to be published. [Online]. Available
-
H.-M. Wang, F. Liu, and M. Yang, "Joint cooperative beamforming, jamming and power allocation to secure AF relay systems, " IEEE Trans. Veh. Technol., to be published. [Online]. Available: http://ieeexplore. ieee. org/stamp/stamp. jsp?tp=&arnumber=6955810
-
IEEE Trans. Veh. Technol.
-
-
Wang, H.-M.1
Liu, F.2
Yang, M.3
-
17
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan.
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers, " IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-39, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 35-39
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.C.5
-
18
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks, " IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3632, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3632
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
19
-
-
84897459881
-
Algorithms for secrecy guarantee with null space beamforming in two-way relay networks
-
Apr.
-
Y. Yang, C. Sun, H. Zhao, H. Long, and W. Wang, "Algorithms for secrecy guarantee with null space beamforming in two-way relay networks, " IEEE Trans. Signal Process., vol. 62, no. 8, pp. 2111-2126, Apr. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.8
, pp. 2111-2126
-
-
Yang, Y.1
Sun, C.2
Zhao, H.3
Long, H.4
Wang, W.5
-
20
-
-
35448931484
-
Cooperative communications with outage-optimal opportunistic relaying
-
Sep.
-
A. Bletsas, H. Shin, and M. Z. Win, "Cooperative communications with outage-optimal opportunistic relaying, " IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3450-3460, Sep. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.9
, pp. 3450-3460
-
-
Bletsas, A.1
Shin, H.2
Win, M.Z.3
-
21
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. Thompson, and S. Mclaughlin, "Relay selection for secure cooperative networks with jamming, " IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.2
McLaughlin, S.3
-
22
-
-
84884537599
-
Optimal relay selection for physical layer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, andW. Shen, "Optimal relay selection for physical layer security in cooperative wireless networks, " IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
23
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdroppers CSI
-
Jan.
-
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdroppers CSI, " IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
24
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
25
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, " IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
26
-
-
84929327918
-
Uncoordinated Jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach
-
May
-
C. Wang, H.-M. Wang, X.-G. Xia, and C. Liu, "Uncoordinated Jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach, " IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2596-2612, May 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.5
, pp. 2596-2612
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
Liu, C.4
-
27
-
-
33847736358
-
Spectral efficient protocols for half-duplex fading relay channels
-
Feb.
-
B. Rankov and A. Wittneben, "Spectral efficient protocols for half-duplex fading relay channels, " IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 379-389, Feb. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.2
, pp. 379-389
-
-
Rankov, B.1
Wittneben, A.2
-
28
-
-
84861117966
-
Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks
-
Jun.
-
Y. Cheng and M. Pesavento, "Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks, " IEEE Trans. Signal Process., vol. 60, no. 6, pp. 2962-2973, Jun. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.6
, pp. 2962-2973
-
-
Cheng, Y.1
Pesavento, M.2
-
29
-
-
68249160802
-
Multiple peer-topeer communications using a network of relays
-
Aug.
-
S. Fazeli-Dehkordy, S. Shahbazpanahi, and S. Gazor, "Multiple peer-topeer communications using a network of relays, " IEEE Trans. Signal Process., vol. 57, no. 8, pp. 3053-3062, Aug. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.8
, pp. 3053-3062
-
-
Fazeli-Dehkordy, S.1
Shahbazpanahi, S.2
Gazor, S.3
-
30
-
-
84555190729
-
Distributed beamforming for multi-group multicasting relay networks
-
Jan.
-
N. Bornhorst, M. Pesavento, and A. B. Gershman, "Distributed beamforming for multi-group multicasting relay networks, " IEEE Trans. Signal Process., vol. 60, no. 1, pp. 221-232, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 221-232
-
-
Bornhorst, N.1
Pesavento, M.2
Gershman, A.B.3
-
31
-
-
45249101530
-
The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
32
-
-
84870336491
-
A storm of feasibility pumps for nonconvex MINLP
-
Dec.
-
C. D'Ambrosio, A. Frangioni, L. Liberti, and A. Lodi, "A storm of feasibility pumps for nonconvex MINLP, " Math. Programm., vol. 136, no. 2, pp. 375-402, Dec. 2012.
-
(2012)
Math. Programm.
, vol.136
, Issue.2
, pp. 375-402
-
-
D'Ambrosio, C.1
Frangioni, A.2
Liberti, L.3
Lodi, A.4
-
33
-
-
84890121948
-
Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback
-
Oct.
-
X. Chen and R. Yin, "Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback, " IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503-506, Oct. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.5
, pp. 503-506
-
-
Chen, X.1
Yin, R.2
-
34
-
-
84877644812
-
Secure MISO cognitive radio system with perfect and imperfect CSI
-
Jun.
-
T. Kwon, V. W. S. Wong, and R. Schober, "Secure MISO cognitive radio system with perfect and imperfect CSI, " in Proc. IEEE ICC, Jun. 2012, pp. 1236-1241.
-
(2012)
Proc. IEEE ICC
, pp. 1236-1241
-
-
Kwon, T.1
Wong, V.W.S.2
Schober, R.3
-
35
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
-
May
-
Q. Li andW.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization, " IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.-K.2
-
36
-
-
84867619190
-
Detecting passive eavesdroppers in the MIMO wiretap channel
-
Mar.
-
A. Mukherjee and A. L. Swindlehurst, "Detecting passive eavesdroppers in the MIMO wiretap channel, " in Proc. IEEE ICASSP, Kyoto, Japan, Mar. 2012, pp. 2809-2812.
-
(2012)
Proc. IEEE ICASSP, Kyoto, Japan
, pp. 2809-2812
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
37
-
-
27744504251
-
Collaborative beamforming for distributed wireless Ad Hoc sensor networks
-
Nov.
-
H. Ochiai, P. Mitran, H. V. Poor, and V. Tarokh, "Collaborative beamforming for distributed wireless Ad Hoc sensor networks, " IEEE Trans. Signal Process., vol. 53, no. 11, pp. 4110-4124, Nov. 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.11
, pp. 4110-4124
-
-
Ochiai, H.1
Mitran, P.2
Poor, H.V.3
Tarokh, V.4
-
39
-
-
34547453958
-
A general inner approximation algorithm for nonconvex mathematical programs
-
Jul./Aug.
-
B. R. Marks and G. P. Wright, "A general inner approximation algorithm for nonconvex mathematical programs, " Oper. Res., vol. 26, no. 4, pp. 681-683, Jul./Aug. 1978.
-
(1978)
Oper. Res.
, vol.26
, Issue.4
, pp. 681-683
-
-
Marks, B.R.1
Wright, G.P.2
-
40
-
-
77954761580
-
A sequential parametric convex approximation method with applications to nonconvex truss topology design problems
-
May
-
A. Beck, A. Ben-Tal, and L. Tetruashvili, "A sequential parametric convex approximation method with applications to nonconvex truss topology design problems, " J. Global Optim., vol. 47, no. 1, pp. 29-51, May 2010.
-
(2010)
J. Global Optim.
, vol.47
, Issue.1
, pp. 29-51
-
-
Beck, A.1
Ben-Tal, A.2
Tetruashvili, L.3
-
41
-
-
0036923521
-
Implementation of interior point methods for mixed semidefinite and second order cone optimization problems
-
J. F. Sturm, "Implementation of interior point methods for mixed semidefinite and second order cone optimization problems, " Optim. Methods Softw., vol. 17, no. 6, pp. 1105-1154, 2002.
-
(2002)
Optim. Methods Softw.
, vol.17
, Issue.6
, pp. 1105-1154
-
-
Sturm, J.F.1
|