-
1
-
-
0031212287
-
Multitier cell design
-
Aug.
-
X. Lagrange, "Multitier cell design, " IEEE Commun. Mag., vol. 35, no. 8, pp. 60-64, Aug. 1997.
-
(1997)
IEEE Commun. Mag.
, vol.35
, Issue.8
, pp. 60-64
-
-
Lagrange, X.1
-
2
-
-
78650209799
-
Open vs. Closed access femtocells in the uplink
-
Dec.
-
P. Xia, V. Chandrasekhar, and J. G. Andrews, "Open vs. closed access femtocells in the uplink, " IEEE Trans. Wireless Commun., vol. 9, no. 12, pp. 3798-3809, Dec. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.12
, pp. 3798-3809
-
-
Xia, P.1
Chandrasekhar, V.2
Andrews, J.G.3
-
3
-
-
77249157928
-
Access control mechanisms for femtocells
-
Jan.
-
G. de la Roche, A. Valcarce, D. López-Pérez, and J. Zhang, "Access control mechanisms for femtocells, " IEEE Commun. Mag., vol. 48, no. 1, pp. 33-39, Jan. 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.1
, pp. 33-39
-
-
De La Roche, G.1
Valcarce, A.2
López-Pérez, D.3
Zhang, J.4
-
4
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
5
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sep.
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel, " IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
6
-
-
77955721830
-
Multiple-input multiple-output Gaussian broadcast channels with confidential messages
-
Sep.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "Multiple-input multiple-output Gaussian broadcast channels with confidential messages, " IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4215-4227, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4215-4227
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
7
-
-
77958560746
-
Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel, " IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
8
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays, " IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
9
-
-
84961793621
-
Enhancing wireless secrecy via cooperation: Signal design and optimization
-
Dec.
-
H.-M. Wang and X.-G. Xia, "Enhancing wireless secrecy via cooperation: Signal design and optimization, " IEEE Commun. Mag., vol. 53, no. 12, pp. 47-53, Dec. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.12
, pp. 47-53
-
-
Wang, H.-M.1
Xia, X.-G.2
-
10
-
-
84870512709
-
Joint cooperative beam-forming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's ICSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beam-forming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's ICSI, " IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
11
-
-
84930197364
-
Outage constrained secrecy throughput maximization for DF relay networks
-
May
-
T.-X. Zheng, H.-M. Wang, F. Liu, and M. H. Lee, "Outage constrained secrecy throughput maximization for DF relay networks, " IEEE Trans. Commun., vol. 63, no. 5, pp. 1741-1755, May 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.5
, pp. 1741-1755
-
-
Zheng, T.-X.1
Wang, H.-M.2
Liu, F.3
Lee, M.H.4
-
12
-
-
45249101530
-
The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
13
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks, " IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
14
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, and Q. Yin, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks, " IEEE Trans. Inf. Forensics Secur., vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
-
15
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
Mar.
-
A. Mukherjee, S. Fakoorian, J. Huang, and A. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey, " IEEE Commun. Surv. Tuts., vol. 16, no. 3, pp. 1550-1573, Mar. 2014.
-
(2014)
IEEE Commun. Surv. Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.2
Huang, J.3
Swindlehurst, A.4
-
16
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise, " IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
17
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation, " IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
18
-
-
84879203277
-
On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels
-
Jun.
-
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels, " IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
19
-
-
84921405314
-
Secure MISO wiretap channels with multi-antenna passive eavesdropper: Artificial noise vs. Artificial fast fading
-
Jan.
-
H.-M. Wang, T. Zheng, and X.-G. Xia, "Secure MISO wiretap channels with multi-antenna passive eavesdropper: Artificial noise vs. artificial fast fading, " IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 94-106, Jan. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.1
, pp. 94-106
-
-
Wang, H.-M.1
Zheng, T.2
Xia, X.-G.3
-
20
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, " IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
21
-
-
84920830630
-
Secrecy transmission with a helper: To relay or to jam
-
Feb.
-
H. Deng, H.-M. Wang, W. Guo, and W. Wang, "Secrecy transmission with a helper: To relay or to jam, " IEEE Trans. Inf. Forensics Secur., vol. 10, no. 2, pp. 293-307, Feb. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.2
, pp. 293-307
-
-
Deng, H.1
Wang, H.-M.2
Guo, W.3
Wang, W.4
-
22
-
-
79957978453
-
Stochastic geometry and random graphs for the analysis and design of wireless networks
-
Sep.
-
M. Haenggi, J. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks, " IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.7
, pp. 1029-1046
-
-
Haenggi, M.1
Andrews, J.2
Baccelli, F.3
Dousse, O.4
Franceschetti, M.5
-
23
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission, " IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
24
-
-
84906228732
-
On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers
-
Aug.
-
T.-X. Zheng, H.-M. Wang, and Q. Yin, "On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers, " IEEE Commun. Lett., vol. 18, no. 8, pp. 1299-1302, Aug. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.8
, pp. 1299-1302
-
-
Zheng, T.-X.1
Wang, H.-M.2
Yin, Q.3
-
25
-
-
80051955278
-
Physical-layer secrecy of MIMO communications in the presence of a Poisson random field of eavesdroppers
-
Jun.
-
M. Ghogho and A. Swami, "Physical-layer secrecy of MIMO communications in the presence of a Poisson random field of eavesdroppers, " in Proc. IEEE Int. Conf. Commun. (ICC) Workshops, Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE Int. Conf. Commun. (ICC) Workshops
, pp. 1-5
-
-
Ghogho, M.1
Swami, A.2
-
26
-
-
84960156001
-
Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers
-
Nov.
-
T.-X. Zheng, H.-M. Wang, J. Yuan, D. Towsley, and M. H. Lee, "Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers, " IEEE Trans. Commun., vol. 63, no. 11, pp. 4347-4362, Nov. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.11
, pp. 4347-4362
-
-
Zheng, T.-X.1
Wang, H.-M.2
Yuan, J.3
Towsley, D.4
Lee, M.H.5
-
27
-
-
85027039668
-
Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers
-
Dec. to be published
-
T.-X. Zheng and H.-M. Wang, "Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers, " IEEE Trans. Veh. Technnol., Dec. 2015, doi: 10.1109/TVT.2015.2513003, to be published.
-
(2015)
IEEE Trans. Veh. Technnol
-
-
Zheng, T.-X.1
Wang, H.-M.2
-
28
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. Ganti, J. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks, " IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.2
Andrews, J.3
Hjørungnes, A.4
-
29
-
-
84887058800
-
Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks
-
Nov.
-
X. Zhang, X. Zhou, and M. R. McKay, "Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks, " IEEE Trans. Inf. Forensics Secur., vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.11
, pp. 1802-1814
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
30
-
-
84880159277
-
Physical layer security in cellular networks: A stochastic geometry approach
-
Jun.
-
H. Wang, X. Zhou, and M. C. Reed, "Physical layer security in cellular networks: A stochastic geometry approach, " IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2776-2787, Jun. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2776-2787
-
-
Wang, H.1
Zhou, X.2
Reed, M.C.3
-
31
-
-
84903148893
-
Physical layer security in downlink multi-antenna cellular networks
-
Jun.
-
G. Geraci, H. S. Dhillon, J. G. Andrews, J. Yuan, and I. B. Collings, "Physical layer security in downlink multi-antenna cellular networks, " IEEE Trans. Commun., vol. 62, no. 6, pp. 2006-2021, Jun. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.6
, pp. 2006-2021
-
-
Geraci, G.1
Dhillon, H.S.2
Andrews, J.G.3
Yuan, J.4
Collings, I.B.5
-
32
-
-
84927712570
-
Safeguarding 5G wireless communication networks using physical layer security
-
Apr.
-
N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. D. Renzo, "Safeguarding 5G wireless communication networks using physical layer security, " IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.4
, pp. 20-27
-
-
Yang, N.1
Wang, L.2
Geraci, G.3
Elkashlan, M.4
Yuan, J.5
Renzo, M.D.6
-
33
-
-
84930505552
-
Secrecy transmit beamforming for heterogeneous networks
-
Jun.
-
T. Lv, H. Gao, and S. Yang, "Secrecy transmit beamforming for heterogeneous networks, " IEEE J. Sel. Areas Commun., vol. 33, no. 6, pp. 1154-1170, Jun. 2015.
-
(2015)
IEEE J. Sel. Areas Commun.
, vol.33
, Issue.6
, pp. 1154-1170
-
-
Lv, T.1
Gao, H.2
Yang, S.3
-
34
-
-
84859052098
-
Modeling and analysis of K-tier downlink heterogeneous cellular networks
-
Apr.
-
H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, "Modeling and analysis of K-tier downlink heterogeneous cellular networks, " IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550-560, Apr. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.3
, pp. 550-560
-
-
Dhillon, H.S.1
Ganti, R.K.2
Baccelli, F.3
Andrews, J.G.4
-
35
-
-
26844501347
-
On distances in uniformly random networks
-
Oct.
-
M. Haenggi, "On distances in uniformly random networks, " IEEE Trans. Inf. Theory, vol. 51. no. 10, pp. 3584-3586, Oct. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.10
, pp. 3584-3586
-
-
Haenggi, M.1
-
36
-
-
82455167943
-
A tractable approach to coverage and rate in cellular networks
-
Nov.
-
J. G. Andrews, F. Baccelli, and R. K. Ganti, "A tractable approach to coverage and rate in cellular networks, " IEEE Trans. Commun., vol. 59, no. 11, pp. 3122-3134, Nov. 2011.
-
(2011)
IEEE Trans. Commun.
, vol.59
, Issue.11
, pp. 3122-3134
-
-
Andrews, J.G.1
Baccelli, F.2
Ganti, R.K.3
-
37
-
-
84867896256
-
Heterogeneous cellular networks with flexible cell association: A comprehensive downlink SINR analysis
-
Oct.
-
H.-S. Jo, Y. J. Sang, P. Xia, and J. G. Andrews, "Heterogeneous cellular networks with flexible cell association: A comprehensive downlink SINR analysis, " IEEE Trans. Wireless Commun., vol. 11, no. 10, pp. 3484-3495, Oct. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.10
, pp. 3484-3495
-
-
Jo, H.-S.1
Sang, Y.J.2
Xia, P.3
Andrews, J.G.4
-
38
-
-
58149119334
-
Transmission capacity of ad hoc networks with spatial diversity
-
Dec.
-
A. M. Hunter, J. G. Andrews, and S. Weber, "Transmission capacity of ad hoc networks with spatial diversity, " IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 5058-5071, Dec. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.12
, pp. 5058-5071
-
-
Hunter, A.M.1
Andrews, J.G.2
Weber, S.3
-
39
-
-
78650893536
-
Open-loop spatial multiplexing and diversity communications in ad hoc networks
-
Jan.
-
R. H. Y. Louie, M. R. McKay, and I. B. Collings, "Open-loop spatial multiplexing and diversity communications in ad hoc networks, " IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 317-344, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 317-344
-
-
Louie, R.H.Y.1
McKay, M.R.2
Collings, I.B.3
-
40
-
-
84901367917
-
Throughput and energy efficiency analysis of small cell networks with multi-antenna base stations
-
May
-
C. Li, J. Zhang, and K. B. Letaief, "Throughput and energy efficiency analysis of small cell networks with multi-antenna base stations, " IEEE Trans. Wireless Commun., vol. 13, no. 5, pp. 2505-2517, May 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.5
, pp. 2505-2517
-
-
Li, C.1
Zhang, J.2
Letaief, K.B.3
-
41
-
-
0031530514
-
On some inequalities for the incomplete gamma function
-
Apr.
-
H. Alzer, "On some inequalities for the incomplete gamma function, " Math. Comput., vol. 66, no. 218, pp. 771-778, Apr. 1997.
-
(1997)
Math. Comput.
, vol.66
, Issue.218
, pp. 771-778
-
-
Alzer, H.1
-
42
-
-
34548842009
-
Cardano and the solution of the cubic
-
Hoboken, NJ, USA: Wiley ch. 6
-
W. Dunham, "Cardano and the solution of the cubic, " in Journey through Genius: The Great Theorems of Mathematics. Hoboken, NJ, USA: Wiley, 1990, ch. 6, pp. 133-154.
-
(1990)
Journey Through Genius: The Great Theorems of Mathematics
, pp. 133-154
-
-
Dunham, W.1
-
43
-
-
77954499023
-
-
Cambrige, U.K.: Cambrige Univ. Press
-
F. W. J. Olver, D. W. Lozier, R. F. Boisvert, and C. W. Clark, NIST Handbook of Mathematical Functions, Cambrige, U.K.: Cambrige Univ. Press, 2010.
-
(2010)
NIST Handbook of Mathematical Functions
-
-
Olver, F.W.J.1
Lozier, D.W.2
Boisvert, R.F.3
Clark, C.W.4
-
44
-
-
0003444918
-
-
Hoboken, NJ, USA: Wiley
-
D. Stoyan, W. Kendall, and J. Mecke, Stochastic Geometry and its Applications, 2nd ed. Hoboken, NJ, USA: Wiley, 1996.
-
(1996)
Stochastic Geometry and Its Applications, 2nd Ed
-
-
Stoyan, D.1
Kendall, W.2
Mecke, J.3
-
45
-
-
0003498504
-
-
New York, NY, USA: Academic
-
I. S. Gradshteyn, I. M. Ryzhik, A. Jeffrey, D. Zwillinger, and S. Technica, Table of Integrals, Series, and Products, 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, and Products, 7th Ed
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
Jeffrey, A.3
Zwillinger, D.4
Technica, S.5
|