-
1
-
-
84904788826
-
-
Boca Raton, FL, USA: CRC Press
-
X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless Communications. Boca Raton, FL, USA: CRC Press, 2013
-
(2013)
Physical Layer Security in Wireless Communications
-
-
Zhou, X.1
Song, L.2
Zhang, Y.3
-
2
-
-
0016562514
-
The wire-tap channel
-
Jan
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Jan. 1975
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
3
-
-
45249119255
-
Secure communication over fading channels
-
Jun
-
Y. Liang, H. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.2
Shamai, S.3
-
5
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai, "Information theoretic security," Found. Trends Commun. Inf. Theory, vol. 5, no. 4-5, pp. 355-580, 2009
-
(2009)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
6
-
-
80051779980
-
Secure communications over wireless broadcast networks: Stability and utility maximization
-
Sep
-
Y. Liang, H. V. Poor, and L. Ying, "Secure communications over wireless broadcast networks: Stability and utility maximization," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 682-692, Sep. 2011
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 682-692
-
-
Liang, Y.1
Poor, H.V.2
Ying, L.3
-
7
-
-
77958560746
-
Secure transmission with multiple antennas II: The MIMOME wiretap channel
-
Nov
-
A. Khisti and G.W.Wornell, "Secure transmission with multiple antennas II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
9
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar
-
G. Zheng, L.-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
10
-
-
85027929481
-
Opportunistic relaying for secrecy communications: Cooperative jamming vs relay chatting
-
Jun
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "Opportunistic relaying for secrecy communications: Cooperative jamming vs relay chatting," IEEE Trans. Wireless Commun., vol. 29, no. 10, pp. 2067-2076, Jun. 2011
-
(2011)
IEEE Trans. Wireless Commun
, vol.29
, Issue.10
, pp. 2067-2076
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
11
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Feb
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012
-
(2012)
IEEE J. Sel. Areas Commun
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
12
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
13
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach
-
Mar
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
14
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
-
May
-
Q. Li and W.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.-K.2
-
15
-
-
84921405314
-
Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. Artificial fast fading
-
Jan
-
H.-M. Wang, T. Zheng, and X.-G. Xia, "Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. artificial fast fading," IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 94-106, Jan. 2015
-
(2015)
IEEE Trans. Wireless Commun
, vol.14
, Issue.1
, pp. 94-106
-
-
Wang, H.-M.1
Zheng, T.2
Xia, X.-G.3
-
16
-
-
70349682785
-
Robust interference control techniques for multi-user cognitive radios using worst-case performance optimization
-
Pacific Grove, CA, USA, Oct
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "Robust interference control techniques for multi-user cognitive radios using worst-case performance optimization," in Proc. Asilomar Conf. Signals Syst. Comp., Pacific Grove, CA, USA, Oct. 2008, pp. 378-382
-
(2008)
Proc. Asilomar Conf. Signals Syst. Comp
, pp. 378-382
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
17
-
-
67549134798
-
A robust beamforming based interference control technique and its performance for cognitive radios
-
Oct
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "A robust beamforming based interference control technique and its performance for cognitive radios," in Proc. Int. Symp. Commun. Inf. Technol., Oct. 2008, pp. 9-13
-
(2008)
Proc. Int. Symp. Commun. Inf. Technol
, pp. 9-13
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
18
-
-
77951114748
-
Robust interference control techniques for cognitive radios using worst-case performance optimization
-
Auckland, New Zealand, Dec
-
K. Cumanan, R. Krishna, V. Sharma, and S. Lambotharan, "Robust interference control techniques for cognitive radios using worst-case performance optimization," in Proc. Int. Symp. Inf. Theory Appl., Auckland, New Zealand, Dec. 2008, pp. 1-5
-
(2008)
Proc. Int. Symp. Inf. Theory Appl
, pp. 1-5
-
-
Cumanan, K.1
Krishna, R.2
Sharma, V.3
Lambotharan, S.4
-
19
-
-
67650663170
-
Energy-efficient multiuser SIMO: Achieving probabilistic robustness with Gaussian channel uncertainty
-
Jun
-
G. Zheng, K.-K. Wong, and T.-S. Ng, "Energy-efficient multiuser SIMO: Achieving probabilistic robustness with Gaussian channel uncertainty," IEEE Trans. Commun., vol. 57, no. 6, pp. 1866-1878, Jun. 2009
-
(2009)
IEEE Trans. Commun
, vol.57
, Issue.6
, pp. 1866-1878
-
-
Zheng, G.1
Wong, K.-K.2
Ng, T.-S.3
-
20
-
-
70450284436
-
Robust cognitive beamforming with bounded channel uncertainties
-
Dec
-
G. Zheng, K.-K. Wong, and B. Ottersten, "Robust cognitive beamforming with bounded channel uncertainties," IEEE Trans. Signal Process., vol. 57, no. 12, pp. 4871-4881, Dec. 2009
-
(2009)
IEEE Trans. Signal Process
, vol.57
, Issue.12
, pp. 4871-4881
-
-
Zheng, G.1
Wong, K.-K.2
Ottersten, B.3
-
21
-
-
77951542370
-
Robust beamforming design: From cognitive radioMISO channels to secrecyMISO channels
-
Nov
-
L. Zhang, Y.-C. Liang, Y. Pei, and R. Zhang, "Robust beamforming design: From cognitive radioMISO channels to secrecyMISO channels," in Proc. IEEE GLOBECOM, Nov. 2009, pp. 1-5
-
(2009)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Zhang, L.1
Liang, Y.-C.2
Pei, Y.3
Zhang, R.4
-
22
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
23
-
-
84903554995
-
Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper
-
May
-
K. Cumanan, Z. Ding, B. Sharif, G. Tian, and K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014
-
(2014)
IEEE Trans. Veh. Technol
, vol.63
, Issue.4
, pp. 1678-1690
-
-
Cumanan, K.1
Ding, Z.2
Sharif, B.3
Tian, G.4
Leung, K.5
-
24
-
-
84929359010
-
Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
-
May
-
Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le Goff, "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer," IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1833-1847, May 2015
-
(2015)
IEEE Trans. Veh. Technol
, vol.64
, Issue.5
, pp. 1833-1847
-
-
Chu, Z.1
Cumanan, K.2
Ding, Z.3
Johnston, M.4
Le Goff, S.5
-
25
-
-
84962152700
-
To harvest and jam: A paradigm of self-sustaining friendly jammers for secure AF relaying
-
H. Xing, K. Wong, Z. Chu, and A. Nallanathan. "To harvest and jam: A paradigm of self-sustaining friendly jammers for secure AF relaying," IEEE Trans. Signal process., [Online]. Available: http://arxiv.org/abs/1502.07066
-
IEEE Trans. Signal Process
-
-
Xing, H.1
Wong, K.2
Chu, Z.3
Nallanathan, A.4
-
26
-
-
79960399745
-
Robust beamforming for security in MIMO wiretap channels with imperfect CSI
-
Jan
-
A. Mukherjee and L. A. Swindlehurst, "Robust beamforming for security in MIMO wiretap channels with imperfect CSI," IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351-361, Jan. 2011
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.1
, pp. 351-361
-
-
Mukherjee, A.1
Swindlehurst, L.A.2
-
27
-
-
84923886792
-
Robust outage secrecy rate optimizations for a MIMO secrecy channel
-
Feb
-
Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le Goff, "Robust outage secrecy rate optimizations for a MIMO secrecy channel," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 86-89, Feb. 2015
-
(2015)
IEEE Wireless Commun. Lett
, vol.4
, Issue.1
, pp. 86-89
-
-
Chu, Z.1
Cumanan, K.2
Ding, Z.3
Johnston, M.4
Le Goff, S.5
-
28
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr
-
S. Gerbracht, C. Scheunert, and E. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 704-716, Apr. 2012
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.3
-
31
-
-
84882770101
-
Secrecy outage capacity of fading channels
-
Sep
-
O. Gungor, J. Tan, C. Koksal, H. El-Gamal, and N. Shroff, "Secrecy outage capacity of fading channels," IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5379-5397, Sep. 2013
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.9
, pp. 5379-5397
-
-
Gungor, O.1
Tan, J.2
Koksal, C.3
El-Gamal, H.4
Shroff, N.5
-
32
-
-
84907983591
-
Outage constrained robust secure transmission for MISO wiretap channels
-
Oct
-
S. Ma, M. Hong, E. Song, X. Wang, and D. Sun, "Outage constrained robust secure transmission for MISO wiretap channels," IEEE Trans. Wireless Commun., vol. 13, no. 10, pp. 5558-5570, Oct. 2014
-
(2014)
IEEE Trans. Wireless Commun
, vol.13
, Issue.10
, pp. 5558-5570
-
-
Ma, S.1
Hong, M.2
Song, E.3
Wang, X.4
Sun, D.5
-
35
-
-
84908023928
-
Outage constrained robust transmit optimization for multiuser MISO downlinks: Tractable approximations by conic optimization
-
Nov
-
K.-Y. Wang, A.-C. So, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "Outage constrained robust transmit optimization for multiuser MISO downlinks: Tractable approximations by conic optimization," IEEE Trans. Signal Process., vol. 62, no. 21, pp. 5690-5705, Nov. 2014
-
(2014)
IEEE Trans. Signal Process
, vol.62
, Issue.21
, pp. 5690-5705
-
-
Wang, K.-Y.1
So, A.-C.2
Chang, T.-H.3
Ma, W.-K.4
Chi, C.-Y.5
-
36
-
-
0003595806
-
-
Philadelphia, PA, USA: SIAM
-
S. Boyd, L. E. Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequalities in System and Control Theory. Philadelphia, PA, USA: SIAM, 1994
-
(1994)
Linear Matrix Inequalities in System and Control Theory
-
-
Boyd, S.1
Ghaoui, L.E.2
Feron, E.3
Balakrishnan, V.4
-
37
-
-
30344443099
-
A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization
-
Jan
-
A. Pascual-Iserte, D. Palomar, A. Perez-Neira, andM. Lagunas, "A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization," IEEE Trans. Signal Process., vol. 54, no. 1, pp. 346-360, Jan. 2006
-
(2006)
IEEE Trans. Signal Process
, vol.54
, Issue.1
, pp. 346-360
-
-
Pascual-Iserte, A.1
Palomar, D.2
Perez-Neira, A.3
Lagunas, M.4
-
38
-
-
70450200104
-
Strong duality for the CDT problem: A necessary and sufficient condition
-
Feb
-
W. Ai and S. Zhang, "Strong duality for the CDT problem: A necessary and sufficient condition," SIAM J. Optim., vol. 19, pp. 1735-1756, Feb. 2009
-
(2009)
SIAM J. Optim
, vol.19
, pp. 1735-1756
-
-
Ai, W.1
Zhang, S.2
-
39
-
-
11844289605
-
Robust mean-squared error estimation in the presence of model uncertainties
-
Jan
-
Y. Eldar, A. Ben-Tal, and A. Nemirovski, "Robust mean-squared error estimation in the presence of model uncertainties," IEEE Trans. Signal Process., vol. 53, no. 1, pp. 168-181, Jan. 2005
-
(2005)
IEEE Trans. Signal Process
, vol.53
, Issue.1
, pp. 168-181
-
-
Eldar, Y.1
Ben-Tal, A.2
Nemirovski, A.3
-
40
-
-
84916620311
-
Masked beamforming in the presence of energy-harvesting eavesdroppers
-
Jan
-
M. Khandaker and K. Wong, "Masked beamforming in the presence of energy-harvesting eavesdroppers," IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 40-54, Jan. 2015
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.1
, pp. 40-54
-
-
Khandaker, M.1
Wong, K.2
|