-
1
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
2
-
-
45249101530
-
The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple access and two-way wire-tap channels: Achievable rates and cooperative jamming," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
3
-
-
67649499991
-
Wireless secrecy in cellular systems with infrastructure-aided cooperation
-
Jun.
-
P. Popovski and O. Simeone, "Wireless secrecy in cellular systems with infrastructure-aided cooperation," IEEE Trans. Inf. Forensics Security, vol. 4, no. 2, pp. 242-256, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.2
, pp. 242-256
-
-
Popovski, P.1
Simeone, O.2
-
4
-
-
84896908427
-
Maxratio relay selection in secure buffer-aided cooperative wireless networks
-
Apr.
-
G. Chen, Z. Tian, Y. Gong, Z. Chen, and J. A. Chambers, "Maxratio relay selection in secure buffer-aided cooperative wireless networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 719-729, Apr. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.4
, pp. 719-729
-
-
Chen, G.1
Tian, Z.2
Gong, Y.3
Chen, Z.4
Chambers, J.A.5
-
5
-
-
66949180834
-
A note on the secrecy capacity of the multiple-antenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai (Shitz), "A note on the secrecy capacity of the multiple-antenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
6
-
-
70350706020
-
The capacity region of the degraded multiple-input multiple-output compound broadcast channel
-
Nov.
-
H. Weingarten, T. Liu, S. Shamai (Shitz), Y. Steinberg, and P. Viswanath, "The capacity region of the degraded multiple-input multiple-output compound broadcast channel," IEEE Trans. Inf. Theory, vol. 55, no. 11, pp. 5011-5023, Nov. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.11
, pp. 5011-5023
-
-
Weingarten, H.1
Liu, T.2
Shamai, S.3
Steinberg, Y.4
Viswanath, P.5
-
7
-
-
84922811042
-
Physical layer network security in the full-duplex relay system
-
Mar.
-
G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system," IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 574-583, Mar. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.3
, pp. 574-583
-
-
Chen, G.1
Gong, Y.2
Xiao, P.3
Chambers, J.A.4
-
8
-
-
85014200295
-
Dual antenna selection in secure cognitive radio networks
-
Oct.
-
G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Dual antenna selection in secure cognitive radio networks," IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 7993-8002, Oct. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.10
, pp. 7993-8002
-
-
Chen, G.1
Gong, Y.2
Xiao, P.3
Chambers, J.A.4
-
9
-
-
70349218031
-
Amplify-and-forward based cooperation for secure wireless communications
-
Taipei, Taiwan, Apr.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Amplify-and-forward based cooperation for secure wireless communications," in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., Taipei, Taiwan, Apr. 2009, pp. 2613-2616.
-
(2009)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process
, pp. 2613-2616
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
10
-
-
52349086199
-
The secrecy graph and some of its properties
-
Toronto, Canada Jul.
-
M. Haenggi, "The secrecy graph and some of its properties," in Proc. IEEE Int. Symp. Inf. Theory, Toronto, Canada, Jul. 2008, pp. 539-543.
-
(2008)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 539-543
-
-
Haenggi, M.1
-
11
-
-
62949215603
-
Physical-layer security in stochastic wireless networks
-
Singapore, Nov.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Physical-layer security in stochastic wireless networks," in Proc. 11th IEEE Singapore Int. Conf. Cuommun. Syst., Singapore, Nov. 2008, pp. 974-979.
-
(2008)
Proc. 11th IEEE Singapore Int. Conf. Cuommun. Syst
, pp. 974-979
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
12
-
-
84860402665
-
On the throughput cost of physical layer security in decentralized wireless networks
-
Aug.
-
X. Zhou, R. K. Ganti, J. G. Andrews, and A. Hjørungnes, "On the throughput cost of physical layer security in decentralized wireless networks," IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2764-2775, Aug. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.8
, pp. 2764-2775
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
Hjørungnes, A.4
-
13
-
-
84901335099
-
Secrecy rates in broadcast channels with confidential messages and external eavesdroppers
-
May
-
G. Geraci, S. Singh, J. G. Andrews, J. Yuan, and I. B. Collings, "Secrecy rates in broadcast channels with confidential messages and external eavesdroppers," IEEE Trans. Wireless Commun., vol. 13, no. 5, pp. 2931-2943, May 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.5
, pp. 2931-2943
-
-
Geraci, G.1
Singh, S.2
Andrews, J.G.3
Yuan, J.4
Collings, I.B.5
-
14
-
-
84906228732
-
On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers
-
Aug.
-
T. X. Zheng, H. M. Wang, and Q. Yin, "On transmission secrecy outage of a multi-antenna system with randomly located eavesdroppers," IEEE Commun. Lett., vol. 18, no. 8, pp. 1299-1302, Aug. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.8
, pp. 1299-1302
-
-
Zheng, T.X.1
Wang, H.M.2
Yin, Q.3
-
15
-
-
80051955278
-
Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers
-
Jun.
-
M. Ghogho and A. Swami, "Physical-layer secrecy of MIMO communications in the presence of a poisson random field of eavesdroppers," in Proc. IEEE ICC, Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE ICC
, pp. 1-5
-
-
Ghogho, M.1
Swami, A.2
-
16
-
-
84960156001
-
Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers
-
Nov.
-
T. X. Zheng, H. M. Wang, J. Yuan, D. Towsley, and M. H. Lee, "Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers," IEEE Trans. Commun., vol. 63, no. 11, pp. 4347-4362, Nov. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.11
, pp. 4347-4362
-
-
Zheng, T.X.1
Wang, H.M.2
Yuan, J.3
Towsley, D.4
Lee, M.H.5
-
17
-
-
84883272988
-
Study of relay selection in a multi-cell cognitive network
-
Aug.
-
G. Chen, Y. Gong, and J. Chambers, "Study of relay selection in a multi-cell cognitive network," IEEE Wireless Commun. Lett., vol. 2, no. 4, pp. 435-438, Aug. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.4
, pp. 435-438
-
-
Chen, G.1
Gong, Y.2
Chambers, J.3
-
18
-
-
84855911932
-
Secure communication in stochastic wireless networks-part II: Maximum rate and collusion
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-part II: Maximum rate and collusion," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 139-147
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
19
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
20
-
-
84855923041
-
Secure communication in stochastic wireless networks-Part I: Connectivity
-
Feb.
-
P. C. Pinto, J. Barros, and M. Z. Win, "Secure communication in stochastic wireless networks-Part I: Connectivity," IEEE Trans. Inf. Forensics Security, vol. 7, pp. 125-138, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, pp. 125-138
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
21
-
-
84887058800
-
Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks
-
Nov.
-
X. Zhang, X. Zhou, and M. R. McKay, "Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 11, pp. 1802-1814, Nov. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.11
, pp. 1802-1814
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
22
-
-
84929327918
-
Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach
-
May
-
C. Wang, H. M. Wang, X. G. Xia, and C. Liu, "Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2596-2612, May 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.5
, pp. 2596-2612
-
-
Wang, C.1
Wang, H.M.2
Xia, X.G.3
Liu, C.4
-
23
-
-
84879203277
-
On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels
-
Jun.
-
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
24
-
-
84896850363
-
Applications of self-interference cancellation in 5G and beyond
-
Feb.
-
S. Hong et al., "Applications of self-interference cancellation in 5G and beyond," IEEE Commun. Mag., vol. 52, no. 2, pp. 114-121, Feb. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.2
, pp. 114-121
-
-
Hong, S.1
-
28
-
-
84907875274
-
Analog/RF solutions enabling compact full-duplex radios
-
Sep.
-
B. Debaillie et al., "Analog/RF solutions enabling compact full-duplex radios," IEEE J. Sel. Areas Commun., vol. 32, no. 9, pp. 1662-1673, Sep. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.9
, pp. 1662-1673
-
-
Debaillie, B.1
-
29
-
-
80053601254
-
Practical, real-time, full duplex wireless
-
Sep.
-
M. Jain et al., "Practical, real-time, full duplex wireless," in Proc. ACM. MobiCom, Sep. 2011, pp. 301-312.
-
(2011)
Proc. ACM. MobiCom
, pp. 301-312
-
-
Jain, M.1
|