-
1
-
-
73449140803
-
Catching resource-devouring worms in nextgeneration wireless relay systems: Two-way relay and full-duplex relay
-
Sep
-
H. Ju, E. Oh, and D. Hong, "Catching resource-devouring worms in nextgeneration wireless relay systems: Two-way relay and full-duplex relay," IEEE Commun. Mag., vol. 47, no. 9, pp. 58-65, Sep. 2009
-
(2009)
IEEE Commun. Mag
, vol.47
, Issue.9
, pp. 58-65
-
-
Ju, H.1
Oh, E.2
Hong, D.3
-
2
-
-
84862615319
-
Full-duplex MIMO relaying: Achievable rates under limited dynamic range
-
Sep
-
B. P. Day, A. R. Margetts, D. W. Bliss, and P. Schniter, "Full-duplex MIMO relaying: Achievable rates under limited dynamic range," IEEE J. Sel. Areas Commun., vol. 30, no. 8, pp. 1541-1553, Sep. 2012
-
(2012)
IEEE J. Sel. Areas Commun
, vol.30
, Issue.8
, pp. 1541-1553
-
-
Day, B.P.1
Margetts, A.R.2
Bliss, D.W.3
Schniter, P.4
-
3
-
-
34548058561
-
Performance of an echo canceller and channel estimator for on-channel repeaters in DVBT/ H networks
-
Sep
-
K. M. Nasr, J. P. Cosmas, M. Bard, and J. Gledhill, "Performance of an echo canceller and channel estimator for on-channel repeaters in DVBT/ H networks," IEEE Trans. Broadcast., vol. 53, no. 3, pp. 609-618, Sep. 2007
-
(2007)
IEEE Trans. Broadcast
, vol.53
, Issue.3
, pp. 609-618
-
-
Nasr, K.M.1
Cosmas, J.P.2
Bard, M.3
Gledhill, J.4
-
4
-
-
79957975668
-
Full-duplex wireless communications using off-The-shelf radios: Feasibility and first results
-
Pacific Grove, CA, USA, Nov
-
M. Duarte and A. Sabharwal, "Full-duplex wireless communications using off-The-shelf radios: Feasibility and first results," in Proc. Asilomar Conf. Signals Syst. Comput., Pacific Grove, CA, USA, Nov. 2010, pp. 1558-1562
-
(2010)
Proc. Asilomar Conf. Signals Syst. Comput
, pp. 1558-1562
-
-
Duarte, M.1
Sabharwal, A.2
-
5
-
-
77954833497
-
Co-channel interference cancellation using single radio frequency and baseband chain
-
Jul
-
S.W. Kim, Y. J. Chun, and S. Kim, "Co-channel interference cancellation using single radio frequency and baseband chain," IEEE Trans. Commun., vol. 58, no. 7, pp. 2169-2175, Jul. 2010
-
(2010)
IEEE Trans. Commun
, vol.58
, Issue.7
, pp. 2169-2175
-
-
Kim, S.W.1
Chun, Y.J.2
Kim, S.3
-
6
-
-
80053601254
-
Practical, real-time, full duplex wireless
-
Las Vegas, NV, USA, Sep
-
M. Jain, J. I. Choi, and T. Kim, "Practical, real-time, full duplex wireless," in Proc. ACM MobiCom, Las Vegas, NV, USA, Sep. 2011, pp. 301-312
-
(2011)
Proc. ACM MobiCom
, pp. 301-312
-
-
Jain, M.1
Choi, J.I.2
Kim, T.3
-
7
-
-
81455148096
-
Mitigation of loopback selfinterference in full-duplex MIMO relays
-
Dec
-
T. Riihonen, S. Werner, and R. Wichman, "Mitigation of loopback selfinterference in full-duplex MIMO relays," IEEE Trans. Signal Process., vol. 59, no. 12, pp. 5983-5993, Dec. 2011
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.12
, pp. 5983-5993
-
-
Riihonen, T.1
Werner, S.2
Wichman, R.3
-
8
-
-
83655203537
-
Transmit-receive duplexing using digital beamforming system to cancel self-interference
-
Dec
-
T. Snow, C. Fulton, and W. J. Chappell, "Transmit-receive duplexing using digital beamforming system to cancel self-interference," IEEE Trans. Microw. Theory Tech., vol. 59, no. 12, pp. 3494-3503, Dec. 2011
-
(2011)
IEEE Trans. Microw. Theory Tech
, vol.59
, Issue.12
, pp. 3494-3503
-
-
Snow, T.1
Fulton, C.2
Chappell, W.J.3
-
9
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
10
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszar, I.1
Korner, J.2
-
11
-
-
45249119255
-
Secure communication over fading channels
-
Jun
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
12
-
-
39049130758
-
Generalized multiple access channels with confidential messages
-
Seattle, WA, USA, Jul
-
Y. Liang and H. V. Poor, "Generalized multiple access channels with confidential messages," in Proc. IEEE Int. Symp. Inf. Theory, Seattle, WA, USA, Jul. 2006, pp. 952-956
-
(2006)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 952-956
-
-
Liang, Y.1
Poor, H.V.2
-
13
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
14
-
-
84931425598
-
Secret communication using artificial noise
-
Sep
-
R. Negi and S. Goel, "Secret communication using artificial noise," in Proc. IEEE Veh. Technol. Conf., Sep. 2005, vol. 3, pp. 1906-1910
-
(2005)
Proc. IEEE Veh. Technol. Conf
, vol.3
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
15
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
16
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
Apr
-
J. Huang and A. L. Swindlehurst, "Robust secure transmission in MISO channels based on worst-case optimization," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1696-1707, Apr. 2012
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.L.2
-
17
-
-
84858390705
-
Secrecy outage in MISO systems with partial channel information
-
Apr
-
S. Gerbracht, C. Scheunert, and E. A. Jorswieck, "Secrecy outage in MISO systems with partial channel information," IEEE Trans. Inf. Forensics Secur., vol. 7, no. 2, pp. 704-716, Apr. 2012
-
(2012)
IEEE Trans. Inf. Forensics Secur
, vol.7
, Issue.2
, pp. 704-716
-
-
Gerbracht, S.1
Scheunert, C.2
Jorswieck, E.A.3
-
18
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
Oct
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
19
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
20
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar
-
G. Zheng, L. C. Choo, and K. K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.C.2
Wong, K.K.3
-
21
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach
-
Mar
-
W. C. Liao, T. H. Chang, W. K. Ma, and C. Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificialnoise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.C.1
Chang, T.H.2
Ma, W.K.3
Chi, C.Y.4
-
22
-
-
84857366666
-
Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI
-
Feb
-
M. Pei, J. Wei, K. K. Wong, and X. Wang, "Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 544-549, Feb. 2012
-
(2012)
IEEE Trans. Wireless Commun
, vol.11
, Issue.2
, pp. 544-549
-
-
Pei, M.1
Wei, J.2
Wong, K.K.3
Wang, X.4
-
23
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
-
May
-
Q. Li and W. K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.K.2
-
24
-
-
84867873837
-
Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
-
Oct
-
W. Li, M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012
-
(2012)
IEEE Commun. Lett
, vol.16
, Issue.10
, pp. 1628-1631
-
-
Li, W.1
Ghogho, M.2
Chen, B.3
Xiong, C.4
-
25
-
-
84899797495
-
Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization
-
Apr
-
Y. Zhou, Z. Xiang, and Y. Zhu, "Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization," IEEE Signal Process. Lett., vol. 21, no. 7, pp. 804-808, Apr. 2014
-
(2014)
IEEE Signal Process. Lett
, vol.21
, Issue.7
, pp. 804-808
-
-
Zhou, Y.1
Xiang, Z.2
Zhu, Y.3
-
26
-
-
84913593877
-
Joint information-and jammingbeamforming for physical layer security with full duplex base station
-
Dec
-
F. Zhu, F. Gao, M. Yao, and H. Zou, "Joint information-and jammingbeamforming for physical layer security with full duplex base station," IEEE Trans. Signal Process., vol. 62, no. 24, pp. 6391-6401, Dec. 2014
-
(2014)
IEEE Trans. Signal Process
, vol.62
, Issue.24
, pp. 6391-6401
-
-
Zhu, F.1
Gao, F.2
Yao, M.3
Zou, H.4
-
27
-
-
84897001555
-
Design and characterization of a full-duplex multiantenna system for WiFi networks
-
Oct
-
M. Duarte et al., "Design and characterization of a full-duplex multiantenna system for WiFi networks," IEEE Trans. Veh. Technol., vol. 63, no. 3, pp. 1160-1177, Oct. 2012 [Online] Available: http://arxiv.org/pdf/ 1210.1639v2.pdf
-
(2012)
IEEE Trans. Veh. Technol
, vol.63
, Issue.3
, pp. 1160-1177
-
-
Duarte, M.1
-
28
-
-
84883785476
-
Improving physical layer secrecy using full-duplex jamming receivers
-
Oct
-
G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers," IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962-4974, Oct. 2013
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.20
, pp. 4962-4974
-
-
Zheng, G.1
Krikidis, I.2
Li, J.3
Petropulu, A.P.4
Ottersten, B.5
-
29
-
-
84904369477
-
Relay selection for two-way full duplex relay networks with amplify-and-forward protocol
-
Jul
-
H. Cui, L. Song, and B. Jiao, "Relay selection for two-way full duplex relay networks with amplify-and-forward protocol," IEEE Trans.Wireless Commun., vol. 13, no. 7, pp. 3768-3876, Jul. 2014
-
(2014)
IEEE Trans.Wireless Commun
, vol.13
, Issue.7
, pp. 3768-3876
-
-
Cui, H.1
Song, L.2
Jiao, B.3
-
31
-
-
84896328783
-
Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users
-
Feb
-
N. Mokari, S. Parsaeefard, H. Saeedi, and P. Azmi, "Cooperative secure resource allocation in cognitive radio networks with guaranteed secrecy rate for primary users," IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 1058-1073, Feb. 2014
-
(2014)
IEEE Trans. Wireless Commun
, vol.13
, Issue.2
, pp. 1058-1073
-
-
Mokari, N.1
Parsaeefard, S.2
Saeedi, H.3
Azmi, P.4
-
32
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan
-
Y. Yang, Q. Li, W. K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013
-
(2013)
IEEE Signal Process. Lett
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.K.3
Ge, J.4
Ching, P.C.5
-
33
-
-
85032752455
-
Semidefinite relaxation of quadratic optimization problems
-
May
-
Z. Q. Luo, W. K. Ma, A. M. C. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems," IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, May 2010
-
(2010)
IEEE Signal Process. Mag
, vol.27
, Issue.3
, pp. 20-34
-
-
Luo, Z.Q.1
Ma, W.K.2
So, A.M.C.3
Ye, Y.4
Zhang, S.5
-
34
-
-
0000261286
-
Programming with linear fractional functionals
-
Dec
-
A. Charnes andW.W. Cooper, "Programming with linear fractional functionals," Naval Res. Logist. Quart., vol. 9, no. 3-4, pp. 181-186, Dec. 1962
-
(1962)
Naval Res. Logist. Quart
, vol.9
, Issue.3-4
, pp. 181-186
-
-
Charnes, A.1
Cooper, W.W.2
-
35
-
-
84873917749
-
A general robust linear transceiver design for multi-hop amplify-and-forwardMIMO relaying systems
-
Mar
-
C. Xing, S. Ma, Z. Fei, Y.-C. Wu, and H. V. Poor, "A general robust linear transceiver design for multi-hop amplify-and-forwardMIMO relaying systems," IEEE Trans. Signal Process., vol. 61, no. 5, pp. 1196-1209, Mar. 2013
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.5
, pp. 1196-1209
-
-
Xing, C.1
Ma, S.2
Fei, Z.3
Wu, Y.-C.4
Poor, H.V.5
|