-
1
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai, H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy, " IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
2
-
-
84921832973
-
Improving physicallayer security in wireless communications using diversity technique
-
Feb 2015
-
Y. Zou, J. Zhu, X. Wang, V. C. M. Leung, "Improving physicallayer security in wireless communications using diversity technique, " IEEE Netw., vol. 29, no. 1, pp. 42-48, Feb. 2015.
-
IEEE Netw.
, vol.29
, Issue.1
, pp. 42-48
-
-
Zou, Y.1
Zhu, J.2
Wang, X.3
Leung, V.C.M.4
-
3
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, H. V. Poor, "Improving wireless physical layer security via cooperating relays, " IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
4
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, S. Weber, "On cooperative relaying schemes for wireless physical layer security, " IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
5
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Feb.
-
Z. Ding, K. K. Leung, D. L. Goeckel, D. Towsley, "On the application of cooperative transmission to secrecy communications, " IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
6
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks, " IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
7
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan.
-
Y. Yang, W.-K. Ma, J. Ge, P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers, " IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Ma, W.-K.2
Ge, J.3
Ching, P.C.4
-
8
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel, R. Negi, "Guaranteeing secrecy using artificial noise, " IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
9
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, K.-K. Wong, "Optimal cooperative jamming to enhance physical layer security using relays, " IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wong, K.-K.3
-
10
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang, A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks, " IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
11
-
-
77957340850
-
Opportunistic relay selection for cooperative networks with secrecy constraints
-
Sep.
-
I. Krikidis, "Opportunistic relay selection for cooperative networks with secrecy constraints, " IET Commun., vol. 4, no. 15, pp. 1787-1791, Sep. 2010.
-
(2010)
IET Commun.
, vol.4
, Issue.15
, pp. 1787-1791
-
-
Krikidis, I.1
-
12
-
-
84884537599
-
Optimal relay selection for physicallayer security in cooperative wireless networks
-
Oct.
-
Y. Zou, X. Wang, W. Shen, "Optimal relay selection for physicallayer security in cooperative wireless networks, " IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.10
, pp. 2099-2111
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
13
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, L. Hanzo, "Security versus reliability analysis of opportunistic relaying, " IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
14
-
-
84921348505
-
Relay-selection improves the security-reliability trade-off in cognitive radio systems
-
Jan.
-
Y. Zou, B. Champagne, W. P. Zhu, L. Hanzo, "Relay-selection improves the security-reliability trade-off in cognitive radio systems, " IEEE Trans. Commun., vol. 63, no. 1, pp. 215-228, Jan. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.1
, pp. 215-228
-
-
Zou, Y.1
Champagne, B.2
Zhu, W.P.3
Hanzo, L.4
-
15
-
-
84917671161
-
Robust cooperative beamforming, artificial noise design for physical-layer security in AF multi-antenna multi-relay networks
-
Jan.
-
Q. Li, Y. Yang, W.-K. Ma, M. Lin, J. Ge, J. Lin, "Robust cooperative beamforming, artificial noise design for physical-layer security in AF multi-antenna multi-relay networks, " IEEE Trans. Signal Process., vol. 63, no. 1, pp. 206-220, Jan. 2015.
-
(2015)
IEEE Trans. Signal Process.
, vol.63
, Issue.1
, pp. 206-220
-
-
Li, Q.1
Yang, Y.2
Ma, W.-K.3
Lin, M.4
Ge, J.5
Lin, J.6
-
16
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. S. Thompson, S. Mclaughlin, "Relay selection for secure cooperative networks with jamming, " IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
17
-
-
84862963131
-
Joint relay, jammer selection for secure two-way relay networks
-
Feb.
-
J. Chen, R. Zhang, L. Song, Z. Han, B. Jiao, "Joint relay, jammer selection for secure two-way relay networks, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
18
-
-
84876796391
-
Destination assisted cooperative jamming for wireless physical-layer security
-
Apr.
-
Y. Liu, J. Li, A. P. Petropulu, "Destination assisted cooperative jamming for wireless physical-layer security, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 682-693, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 682-693
-
-
Liu, Y.1
Li, J.2
Petropulu, A.P.3
-
19
-
-
84922896499
-
Hybrid opportunistic relaying, jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H.-M. Wang, X.-G. Xia, "Hybrid opportunistic relaying, jamming with power allocation for secure cooperative networks, " IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
20
-
-
84870512709
-
Joint cooperative beamforming, jamming to secure AF relay systems with individual power constraint, no eavesdropper's CSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, Q. Yin, "Joint cooperative beamforming, jamming to secure AF relay systems with individual power constraint, no eavesdropper's CSI, " IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
21
-
-
84888318377
-
Hybrid cooperative beamforming, jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, Q. Yin, X.-G. Xia, "Hybrid cooperative beamforming, jamming for physical-layer security of two-way relay networks, " IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
22
-
-
84885820885
-
Optimal joint cooperative beamforming, artificial noise design for secrecy rate maximization in AF relay networks
-
Germany, Jun.
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, M. Lin, "Optimal joint cooperative beamforming, artificial noise design for secrecy rate maximization in AF relay networks, " in Proc. SPAWC, Darmstadt, Germany, Jun. 2013, pp. 360-364.
-
(2013)
Proc. SPAWC, Darmstadt
, pp. 360-364
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Lin, M.5
-
23
-
-
84905251791
-
Robust transmit design for secure AF relay networks based on worst-case optimization
-
Florence, Italy, May
-
L. Li, Z. Chen, J. Fang, "Robust transmit design for secure AF relay networks based on worst-case optimization, " in Proc. IEEE ICASSP, Florence, Italy, May 2014, pp. 2719-2723.
-
(2014)
Proc. IEEE ICASSP
, pp. 2719-2723
-
-
Li, L.1
Chen, Z.2
Fang, J.3
-
24
-
-
84946240351
-
Robust joint beamforming, jamming for secure AF networks: Low-complexity design
-
May
-
C. Wang, H.-M. Wang, "Robust joint beamforming, jamming for secure AF networks: Low-complexity design, " IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.5
, pp. 2192-2198
-
-
Wang, C.1
Wang, H.-M.2
-
25
-
-
84879149313
-
Secure relay beamforming with imperfect channel side information
-
Jun.
-
X. Wang, K. Wang, X.-D. Zhang, "Secure relay beamforming with imperfect channel side information, " IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2140-2155
-
-
Wang, X.1
Wang, K.2
Zhang, X.-D.3
-
26
-
-
84919667792
-
Secrecy outage, diversity analysis of cognitive radio systems
-
Nov.
-
Y. Zou, X. Li, Y.-C. Liang, "Secrecy outage, diversity analysis of cognitive radio systems, " IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2222-2236, Nov. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.11
, pp. 2222-2236
-
-
Zou, Y.1
Li, X.2
Liang, Y.-C.3
-
27
-
-
84867619190
-
Detecting passive eavesdroppers in the MIMO wiretap channel
-
Mar.
-
A. Mukherjee, A. L. Swindlehurst, "Detecting passive eavesdroppers in the MIMO wiretap channel, " in Proc. IEEE ICASSP, Mar. 2012, pp. 2809-2812.
-
(2012)
Proc. IEEE ICASSP
, pp. 2809-2812
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
28
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, S. W. McLaughlin, "Wireless information-theoretic security, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
29
-
-
84921773816
-
Secure relay, jammer selection for physical layer security
-
Aug.
-
H. Hui, A. L. Swindlehurst, G. Li, J. Liang, "Secure relay, jammer selection for physical layer security, " IEEE Signal Process. Lett., vol. 22, no. 8, pp. 1147-1151, Aug. 2015.
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.8
, pp. 1147-1151
-
-
Hui, H.1
Swindlehurst, A.L.2
Li, G.3
Liang, J.4
-
30
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, H. El Gamal, "On the secrecy capacity of fading channels, " IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
31
-
-
85009775587
-
-
New York, NY, USA: Dover
-
M. Abramowitz, I. A. Stegun, Eds., Handbook of Mathematical Functions: With Formulas, Graphs, Mathematical Tables, 9th ed. New York, NY, USA: Dover, 1972.
-
(1972)
Handbook of Mathematical Functions: With Formulas, Graphs, Mathematical Tables, 9th Ed.
-
-
Abramowitz, M.1
Stegun, I.A.2
-
32
-
-
0003498504
-
-
New York, NY, USA: Academic
-
I. S. Gradshteyn, I. M. Ryzhik, Table of Integrals, Series, Products, 7th ed. New York, NY, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, Products, 7th Ed.
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
33
-
-
0038363341
-
Diversity, multiplexing: A fundamental tradeoff in multiple antenna channels
-
May
-
L. Zheng, D. N. C. Tse, "Diversity, multiplexing: A fundamental tradeoff in multiple antenna channels, " IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1073-1096, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1073-1096
-
-
Zheng, L.1
Tse, D.N.C.2
-
34
-
-
35448931484
-
Cooperative communications with outage optimal opportunistic relaying
-
Sep.
-
A. Bletsas, H. Shin, M. Z. Win, "Cooperative communications with outage optimal opportunistic relaying, " IEEE Trans. Wireless Commun., vol. 6, no. 9, pp. 3450-3460, Sep. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.9
, pp. 3450-3460
-
-
Bletsas, A.1
Shin, H.2
Win, M.Z.3
-
35
-
-
84939544519
-
Secrecy outage of dual-hop regenerative multi-relay system with relay selection
-
Aug.
-
C. Kundu, S. Ghose, R. Bose, "Secrecy outage of dual-hop regenerative multi-relay system with relay selection, " IEEE Trans. Wireless Commun., vol. 14, no. 8, pp. 4614-4625, Aug. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.8
, pp. 4614-4625
-
-
Kundu, C.1
Ghose, S.2
Bose, R.3
|