-
1
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El. Gamal, "On the secrecy capacity of fading channels, " IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.El.3
-
3
-
-
79955372872
-
Physical layer security in wireless networks: A tutorial
-
Apr.
-
Y. Shui, S. Chang, H.Wu, S. Huang, and H. Chen, "Physical layer security in wireless networks: A tutorial, " IEEE Wireless Commun., vol. 18, no. 2, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.2
, pp. 66-74
-
-
Shui, Y.1
Chang, S.2
Wu, H.3
Huang, S.4
Chen, H.5
-
4
-
-
84890121948
-
Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback
-
Oct.
-
X. Chen and R. Yin, "Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback, " IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503-506, Oct. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.5
, pp. 503-506
-
-
Chen, X.1
Yin, R.2
-
5
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap
-
Feb.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap, " IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Feb. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
6
-
-
84910151930
-
Physical layer security in multi-cell MISO downlink with incomplete CSI-A unified secrecy performance analysis
-
Dec.
-
X. Chen and H-H. Chen, "Physical layer security in multi-cell MISO downlink with incomplete CSI-A unified secrecy performance analysis, " IEEE Trans. Signal Process., vol. 62, no. 23, pp. 6286-6297, Dec. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.23
, pp. 6286-6297
-
-
Chen, X.1
Chen, H.-H.2
-
7
-
-
79952846257
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
Feb.
-
E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel, " IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, Feb. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2083-2114
-
-
Ekrem, E.1
Ulukus, S.2
-
8
-
-
84870499401
-
A general relaying transmission protocol for MIMO secrecy communications
-
Nov.
-
Z. Ding, M. Peng, and H. Chen, "A general relaying transmission protocol for MIMO secrecy communications, " IEEE Trans. Commun., vol. 60, no. 11, pp. 3461-3471, Nov. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.3
-
9
-
-
84946607375
-
Large-scale MIMO relaying techniques for physical layer security: AF or DF"
-
Sep.
-
X. Chen, L. Lei, H. Zhang, and C. Yuen, "Large-scale MIMO relaying techniques for physical layer security: AF or DF" IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5135-5146, Sep. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.9
, pp. 5135-5146
-
-
Chen, X.1
Lei, L.2
Zhang, H.3
Yuen, C.4
-
10
-
-
84879203277
-
On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels
-
Jun.
-
X. Zhang, X. Zhou, and M. R. Mckay, "On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels, " IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
11
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
-
May
-
Q. Li and W-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization, " IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.-K.2
-
12
-
-
84907524580
-
Joint design and optimal cooperative jamming and power allocation for linear precoding
-
Sep.
-
J. Yang, I-M. Kim, and D. I. Kim, "Joint design and optimal cooperative jamming and power allocation for linear precoding, " IEEE Trans. Commun., vol. 62, no. 9, pp. 3285-3298, Sep. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.9
, pp. 3285-3298
-
-
Yang, J.1
Kim, I.-M.2
Kim, D.I.3
-
13
-
-
84883380753
-
On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming
-
Sep.
-
T. Wang, K.-H. Park, T. Wang, and M-S. Alouini, "On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1741-1750, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1741-1750
-
-
Wang, T.1
Park, K.-H.2
Wang, T.3
Alouini, M.-S.4
-
14
-
-
84961839468
-
Multi-antenna relay aided wireless physical layer security
-
Dec.
-
X. Chen, C. Zhong, C. Yuen, and H.-H. Chen, "Multi-antenna relay aided wireless physical layer security, " IEEE Commun. Mag., vol. 53, no. 12, pp. 133-141, Dec. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.12
, pp. 133-141
-
-
Chen, X.1
Zhong, C.2
Yuen, C.3
Chen, H.-H.4
-
15
-
-
84946570450
-
Large system secrecy rate analysis for SWIPT MIMO wiretap channels
-
Jan.
-
J. Zhang et al., "Large system secrecy rate analysis for SWIPT MIMO wiretap channels, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 1, pp. 74-85, Jan. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.1
, pp. 74-85
-
-
Zhang, J.1
-
16
-
-
85027407300
-
Mode selection in MU-MIMO downlink networks: A physical layer security perspective
-
to be published
-
X. Chen and Y. Zhang, "Mode selection in MU-MIMO downlink networks: A physical layer security perspective, " IEEE Syst. J., DOI: 10.1109/JSYST.2015.2413843, to be published.
-
IEEE Syst. J.
-
-
Chen, X.1
Zhang, Y.2
-
17
-
-
84872184553
-
Physical layer security of TAS/MRC with antenna correlation
-
Jan.
-
N. Yang, H. Suraweera, I. Collings, and C. Yuen, "Physical layer security of TAS/MRC with antenna correlation, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 254-259, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.1
, pp. 254-259
-
-
Yang, N.1
Suraweera, H.2
Collings, I.3
Yuen, C.4
-
18
-
-
84866730731
-
Energy efficiency of cooperative jamming strategies in secure wireless networks
-
Sep.
-
M. Dehghan, D. L. Goeckel, M. Ghaderi, and Z. Ding, "Energy efficiency of cooperative jamming strategies in secure wireless networks, " IEEE Trans. Wireless Commun., vol. 11, no. 9, pp. 3025-3029, Sep. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.9
, pp. 3025-3029
-
-
Dehghan, M.1
Goeckel, D.L.2
Ghaderi, M.3
Ding, Z.4
-
19
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
Oct.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer, " IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
20
-
-
84890525375
-
Mobile jammer for secrecy rate maximization in cooperative networks
-
D. S. Kalogerias, N. Chatzipanagiotis, M. M. Zavlanos, and A. P. Petropulu, "Mobile jammer for secrecy rate maximization in cooperative networks, " in Proc. IEEE ICASSP, 2013, pp. 2901-2905.
-
(2013)
Proc. IEEE ICASSP
, pp. 2901-2905
-
-
Kalogerias, D.S.1
Chatzipanagiotis, N.2
Zavlanos, M.M.3
Petropulu, A.P.4
-
21
-
-
84883309968
-
Power-constrained optimal cooperative jammer for multiuser broadcasting channel
-
Aug.
-
J. Yang, I.-M. Kim, and D. I. Kim, "Power-constrained optimal cooperative jammer for multiuser broadcasting channel, " IEEEWireless Commun. Lett., vol. 2, no. 4, pp. 411-414, Aug. 2013.
-
(2013)
IEEEWireless Commun. Lett.
, vol.2
, Issue.4
, pp. 411-414
-
-
Yang, J.1
Kim, I.-M.2
Kim, D.I.3
-
22
-
-
84883290453
-
Secure transmission in downlink cellular network with a cooperative jammer
-
Aug.
-
S. Jeong, K. Lee, H. Huh, and J. Kang, "Secure transmission in downlink cellular network with a cooperative jammer, " IEEE Wireless Commun. Lett., vol. 2, no. 4, pp. 463-466, Aug. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.4
, pp. 463-466
-
-
Jeong, S.1
Lee, K.2
Huh, H.3
Kang, J.4
-
23
-
-
84880157215
-
Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdropper
-
Jun.
-
J. Yang, I.-M. Kim, and D. I. Kim, "Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdropper, " IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2840-2852, Jun. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2840-2852
-
-
Yang, J.1
Kim, I.-M.2
Kim, D.I.3
-
24
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks, " IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
25
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L-C. Choo, and K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays, " IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
26
-
-
79955484022
-
On secrecy of codebook-based transmission beamforming under receiver limited feedback
-
Apr.
-
S. Bashar, Z. Ding, and G. Y. Li, "On secrecy of codebook-based transmission beamforming under receiver limited feedback, " IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1212-1223, Apr. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.4
, pp. 1212-1223
-
-
Bashar, S.1
Ding, Z.2
Li, G.Y.3
-
27
-
-
84877584209
-
Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee
-
Apr.
-
X. Chen and L. Lei, "Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee, " IEEE Commun. Lett., vol. 17, no. 4, pp. 637-640, Apr. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.4
, pp. 637-640
-
-
Chen, X.1
Lei, L.2
-
28
-
-
79955465834
-
On ergodic secrecy rate for Gaussian MISO wiretap channels
-
Apr.
-
J. Li and A. P. Petropulu, "On ergodic secrecy rate for Gaussian MISO wiretap channels, " IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1176-1187, Apr. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.4
, pp. 1176-1187
-
-
Li, J.1
Petropulu, A.P.2
-
29
-
-
84891356286
-
Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack
-
Jun.
-
Y. Zou, X. Wang, and W. Shen, "Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack, " in Proc. IEEE ICC, Jun. 2013, pp. 2183-2187.
-
(2013)
Proc. IEEE ICC
, pp. 2183-2187
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
30
-
-
84893431203
-
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
-
Feb.
-
M. Pei, A. L. Swindlehurst, D.Ma, and J.Wei, "Adaptive limited feedback for MISO wiretap channels with cooperative jamming, " IEEE Trans. Signal Process., vol. 62, no. 4, pp. 993-1004, Feb. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.4
, pp. 993-1004
-
-
Pei, M.1
Swindlehurst, A.L.2
Ma, D.3
Wei, J.4
-
31
-
-
84897894009
-
Performance analysis and optimization for interference alignment over MIMO interference channels with limited feedback
-
Apr.
-
X. Chen and C. Yuen, "Performance analysis and optimization for interference alignment over MIMO interference channels with limited feedback, " IEEE Trans. Signal Process., vol. 62, no. 7, pp. 1785-1795, Apr. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.7
, pp. 1785-1795
-
-
Chen, X.1
Yuen, C.2
-
32
-
-
33750593475
-
MIMO broadcast channels with finite-rate feedback
-
Nov.
-
N. Jindal, "MIMO broadcast channels with finite-rate feedback, " IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 5045-5060, Nov. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.11
, pp. 5045-5060
-
-
Jindal, N.1
-
33
-
-
0242270754
-
On beamforming with finite rate feedback in multi-antenna systems
-
Oct.
-
K. K. Mukkavilli, A. Sabharwal, E. Erkip, and B. Aazhang, "On beamforming with finite rate feedback in multi-antenna systems, " IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2562-2579, Oct. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.10
, pp. 2562-2579
-
-
Mukkavilli, K.K.1
Sabharwal, A.2
Erkip, E.3
Aazhang, B.4
-
34
-
-
78650490511
-
On the convolution of exponential distribution
-
Dec.
-
M. Akkouchi, "On the convolution of exponential distribution, " J. Chungcheong Math. Soc., vol. 21, no. 4, pp. 501-510, Dec. 2008.
-
(2008)
J. Chungcheong Math. Soc.
, vol.21
, Issue.4
, pp. 501-510
-
-
Akkouchi, M.1
-
35
-
-
0010342994
-
-
New York, NY, USA: Acedemic
-
I. S. Gradshteyn and I. M. Ryzhik, Tables of Intergrals, Series, and Products. New York, NY, USA: Acedemic, 2007.
-
(2007)
Tables of Intergrals, Series, and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
|