-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
79955372872
-
Physical layer security in wireless networks: A tutorial
-
Apr.
-
Y. Shui, S. Chang, H. Wu, S. Huang, and H. Chen, "Physical layer security in wireless networks: A tutorial," IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.2
, pp. 66-74
-
-
Shui, Y.1
Chang, S.2
Wu, H.3
Huang, S.4
Chen, H.5
-
3
-
-
84863941590
-
Energy-efficient resource allocation for secure OFDMA systems
-
Jul.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2572-2585, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2572-2585
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
4
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap
-
Feb.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Feb. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
5
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
6
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
7
-
-
84890121948
-
Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback
-
Oct.
-
X. Chen and R. Yin, "Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback," IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503-506, Oct. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.5
, pp. 503-506
-
-
Chen, X.1
Yin, R.2
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. Petropulu, and H. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.3
Poor, H.4
-
9
-
-
84961839468
-
Multi-antenna relay aided wireless physical layer security
-
Jun.
-
X. Chen, C. Zhong, C. Yuen, and H.-H. Chen, "Multi-antenna relay aided wireless physical layer security," IEEE Commun. Mag., vol. 53, no. 6, pp. 1-17, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 1-17
-
-
Chen, X.1
Zhong, C.2
Yuen, C.3
Chen, H.-H.4
-
10
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
-
Oct.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
11
-
-
84879149313
-
Secure relay beamforming with imperfect channel side information
-
Jun.
-
X. Wang, K. Wang, and X. Zhang, "Secure relay beamforming with imperfect channel side information," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2140-2155
-
-
Wang, X.1
Wang, K.2
Zhang, X.3
-
12
-
-
84878739878
-
Decode-and-foreard relay beamforming for secrecy with finite-alphabet input
-
May
-
S. Vishwakarma and A. Chockalingam, "Decode-and-foreard relay beamforming for secrecy with finite-alphabet input," IEEE Commun. Lett., vol. 17, no. 5, pp. 912-915, May 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.5
, pp. 912-915
-
-
Vishwakarma, S.1
Chockalingam, A.2
-
13
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
14
-
-
84883380753
-
On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
-
Sep.
-
K. Park, T. Wang, and M. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1741-1750, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1741-1750
-
-
Park, K.1
Wang, T.2
Alouini, M.3
-
15
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
-
Oct.
-
D. Ng, E. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.1
Lo, E.2
Schober, R.3
-
16
-
-
84862571591
-
Relay placement for physical layer security: A secure connection perspective
-
Jun.
-
J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.6
, pp. 878-881
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
-
17
-
-
84884537599
-
Optimal relay selection for physical-layer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, and W. Shen, "Optimal relay selection for physical-layer security in cooperative wireless networks," IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
18
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zhang, L. Choo, and K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zhang, G.1
Choo, L.2
Wong, K.3
-
19
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
-
Jan.
-
H. Wang, M. Luo, X. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.1
Luo, M.2
Xia, X.3
Yin, Q.4
-
20
-
-
84872099887
-
Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems
-
Jan.
-
H. Long, W. Xiang, Y. Zhang, Y. Liu, and W. Wang, "Secrecy capacity enhancement with distributed precoding in multirelay wiretap systems," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 229-238, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.1
, pp. 229-238
-
-
Long, H.1
Xiang, W.2
Zhang, Y.3
Liu, Y.4
Wang, W.5
-
21
-
-
84870499401
-
A general relaying transmission protocol for MIMO secrecy communications
-
Nov.
-
Z. Ding, M. Peng, and H.-H. Chen, "A general relaying transmission protocol for MIMO secrecy communications," IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.-H.3
-
22
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.2
Kim, D.3
-
23
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
24
-
-
84883365784
-
Information leakage neutralization for the multi-antenna non-regenerative relay-assisted multi-carrier interference channel
-
Sep.
-
Z. Ho, E. Jorswieck, and S. Engelmann, "Information leakage neutralization for the multi-antenna non-regenerative relay-assisted multi-carrier interference channel," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1672-1686, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1672-1686
-
-
Ho, Z.1
Jorswieck, E.2
Engelmann, S.3
-
25
-
-
84877584209
-
Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee
-
Apr.
-
X. Chen and L. Lei, "Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee," IEEE Commun. Lett., vol. 17, no. 4, pp. 637-640, Apr. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.4
, pp. 637-640
-
-
Chen, X.1
Lei, L.2
-
26
-
-
84872184553
-
Physical layer security of TAS/MRC with antenna correlation
-
Jan.
-
N. Yang, H. Suraweera, I. Collings, and C. Yuen, "Physical layer security of TAS/MRC with antenna correlation," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 254-259, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.1
, pp. 254-259
-
-
Yang, N.1
Suraweera, H.2
Collings, I.3
Yuen, C.4
-
27
-
-
78449301600
-
Noncooperative cellular wireless with unlimited number of base station antennas
-
Nov.
-
T. L. Marzetta, "Noncooperative cellular wireless with unlimited number of base station antennas," IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3590-3600, Nov. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.11
, pp. 3590-3600
-
-
Marzetta, T.L.1
-
28
-
-
85032752174
-
Scaling to MIMO: Opportunities and challenges with very large arrays
-
Jan.
-
F. Ruseket al., "Scaling to MIMO: Opportunities and challenges with very large arrays," IEEE Signal Process. Mag., vol. 20, no. 1, pp. 40-60, Jan. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.20
, Issue.1
, pp. 40-60
-
-
Rusek, F.1
-
29
-
-
84907220339
-
Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis
-
Jul.
-
J. Zhang, C. Yuen, C.-K. Wen, S. Jin, and X. Gao, "Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis," IEEE Commun. Lett., vol. 18, no. 9, pp. 1627-1630, Jul. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.9
, pp. 1627-1630
-
-
Zhang, J.1
Yuen, C.2
Wen, C.-K.3
Jin, S.4
Gao, X.5
-
30
-
-
84963567995
-
Linear precoding of data and artificial noise in secure massive MIMO systems
-
J. Zhu, R. Schober, and V. K. Bhargava, "Linear precoding of data and artificial noise in secure massive MIMO systems," submitted to IEEE Trans. Wireless Commun., 2015. [Online]. Available: http://arxiv.org/pdf/1505.00330.pdf
-
(2015)
IEEE Trans. Wireless Commun.
-
-
Zhu, J.1
Schober, R.2
Bhargava, V.K.3
-
31
-
-
84943372153
-
Exploiting large-scale MIMO techniques for physical layer security with imperfect CSI
-
Dec.
-
X. Chen, C. Yuen, and Z. Zhang, "Exploiting large-scale MIMO techniques for physical layer security with imperfect CSI," in Proc. IEEE GLOBECOM, Dec. 2014, pp. 1648-1635.
-
(2014)
Proc. IEEE GLOBECOM
, pp. 1635-1648
-
-
Chen, X.1
Yuen, C.2
Zhang, Z.3
-
32
-
-
84880150823
-
Large system analysis of linear precoding in MISO broadcast channels with confidential message
-
Sep.
-
G. Geraci, R. Couillet, J. Yuan, M. Debbah, and I. B. Collings, "Large system analysis of linear precoding in MISO broadcast channels with confidential message," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1660-1671, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1660-1671
-
-
Geraci, G.1
Couillet, R.2
Yuan, J.3
Debbah, M.4
Collings, I.B.5
-
33
-
-
84907195591
-
Secure transmission in multicell massive MIMO systems
-
Sep.
-
J. Zhu, R. Schober, and V. K. Bhargava, "Secure transmission in multicell massive MIMO systems," IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4766-4781, Sep. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.9
, pp. 4766-4781
-
-
Zhu, J.1
Schober, R.2
Bhargava, V.K.3
-
34
-
-
84860389999
-
Pilot contamination and precoding in multi-cell TDD systems
-
Aug.
-
J. Jose, A. Ashikhmin, T. L. Marzetta, and S. Vishwanath, "Pilot contamination and precoding in multi-cell TDD systems," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2640-2651, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2640-2651
-
-
Jose, J.1
Ashikhmin, A.2
Marzetta, T.L.3
Vishwanath, S.4
-
35
-
-
84907003935
-
On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI
-
Jun.
-
X. Chen, L. Lei, H. Zhang, and C. Yuen, "On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI," in Proc. IEEE ICC, Jun. 2014, pp. 2052-2057.
-
(2014)
Proc. IEEE ICC
, pp. 2052-2057
-
-
Chen, X.1
Lei, L.2
Zhang, H.3
Yuen, C.4
-
36
-
-
84903595688
-
Robust beamforming for secure communication in systems with wireless information and power transfer
-
Aug.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Robust beamforming for secure communication in systems with wireless information and power transfer," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599-4615, Aug. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.8
, pp. 4599-4615
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
37
-
-
73049107143
-
Design and analysis of delay-sensitive cross-layer OFDMA systems with outdated CSIT
-
Jul.
-
D. S. W. Hui and V. K. N. Lau, "Design and analysis of delay-sensitive cross-layer OFDMA systems with outdated CSIT," IEEE Trans. Wireless Commun., vol. 8, no. 7, pp. 3484-3491, Jul. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.7
, pp. 3484-3491
-
-
Hui, D.S.W.1
Lau, V.K.N.2
-
38
-
-
4544234593
-
Multiple-antenna channel hardening and its implications for rate-feedback and scheduling
-
Sep.
-
B. M. Hochwald, T. L. Marzetta, and V. Tarokh, "Multiple-antenna channel hardening and its implications for rate-feedback and scheduling," IEEE Tran. Inf. Theory, vol. 50, no. 9, pp. 1893-1909, Sep. 2004.
-
(2004)
IEEE Tran. Inf. Theory
, vol.50
, Issue.9
, pp. 1893-1909
-
-
Hochwald, B.M.1
Marzetta, T.L.2
Tarokh, V.3
|