-
2
-
-
84943808051
-
-
Dec, The Switch, Washington, DC, USA
-
C. Timberg. (Dec. 2014). German Researchers Discover a Flaw That Could Let Anyone Listen to Your Cell Calls, The Switch, Washington, DC, USA. [online]. Available: https://www.washingtonpost.com/news/theswitch/wp/2014/12/18/german-researchers-discover-A-flaw-That-couldlet-Anyone-listen-To-your-cell-calls-And-read-your-Texts/
-
(2014)
German Researchers Discover A Flaw That Could Let Anyone Listen to Your Cell Calls
-
-
Timberg, C.1
-
3
-
-
0016562514
-
The wire-Tap channel
-
A. D. Wyner, "The wire-Tap channel, '' Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
68349116049
-
Information theoretic security
-
Y. Liang, H. V. Poor, and S. Shamai (Shitz), "Information theoretic security, '' Found. Trends Commun. Inf. Theory, vol. 5, nos. 4-5, pp. 355-580, 2008.
-
(2008)
Found. Trends Commun. Inf. Theory
, vol.5
, Issue.4-5
, pp. 355-580
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
5
-
-
85032751776
-
Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Sep
-
Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches, '' IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.-W.P.1
Lan, P.-C.2
Kuo, C.-C.J.3
-
6
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
3rd Quart
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey, '' IEEE Commun. Surveys Tut., vol. 16, no. 3, pp. 1550-1573, 3rd Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tut
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
7
-
-
77949361749
-
Robust joint design of linear relay precoder and destination equalizer for dual-hop amplify-And-forward MIMO relay systems
-
Apr
-
C. Xing, S. Ma, and Y.-C. Wu, "Robust joint design of linear relay precoder and destination equalizer for dual-hop amplify-And-forward MIMO relay systems, '' IEEE Trans. Signal Process., vol. 58, no. 4, pp. 2273-2283, Apr. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.4
, pp. 2273-2283
-
-
Xing, C.1
Ma, S.2
Wu, Y.-C.3
-
8
-
-
70450284402
-
A unified framework for optimizing linear nonregenerative multicarrier MIMO relay communication systems
-
Dec
-
Y. Rong, X. Tang, and Y. Hua, "A unified framework for optimizing linear nonregenerative multicarrier MIMO relay communication systems, '' IEEE Trans. Signal Process., vol. 57, no. 12, pp. 4837-4851, Dec. 2009.
-
(2009)
IEEE Trans. Signal Process
, vol.57
, Issue.12
, pp. 4837-4851
-
-
Rong, Y.1
Tang, X.2
Hua, Y.3
-
9
-
-
84901920479
-
Signal leakage neutralisation in instantaneous non-regenerative relaying networks under channel uncertainty
-
May
-
Z. Ho and E. Jorswieck, "Signal leakage neutralisation in instantaneous non-regenerative relaying networks under channel uncertainty, '' IET Com-mun., vol. 8, no. 8, pp. 1285-1295, May 2014.
-
(2014)
IET Com-mun
, vol.8
, Issue.8
, pp. 1285-1295
-
-
Ho, Z.1
Jorswieck, E.2
-
10
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. El Gamal, "The relay-eavesdropper channel: Cooperation for secrecy, '' IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
El Gamal, H.2
-
11
-
-
84961793621
-
Enhancing wireless secrecy via cooperation: Signal design and optimization
-
Dec
-
H.-M. Wang and X.-G. Xia, "Enhancing wireless secrecy via cooperation: Signal design and optimization, '' IEEE Commun. Mag., vol. 53, no. 12, pp. 47-53, Dec. 2015.
-
(2015)
IEEE Commun. Mag
, vol.53
, Issue.12
, pp. 47-53
-
-
Wang, H.-M.1
Xia, X.-G.2
-
12
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays, '' IEEE Trans. Signal Pro-cess., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Pro-cess
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
13
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security, '' IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
14
-
-
84920830630
-
Secrecy transmission with a helper: To relay or to jam
-
Feb
-
H. Deng, H. M. Wang, W. Guo, and W. Wang, "Secrecy transmission with a helper: To relay or to jam, '' IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 293-307, Feb. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.2
, pp. 293-307
-
-
Deng, H.1
Wang, H.M.2
Guo, W.3
Wang, W.4
-
15
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers, '' IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.C.5
-
16
-
-
84904282993
-
Joint source-relay precoding and power allocation for secure amplify-And-forward MIMO relay networks
-
Aug
-
H.-M. Wang, F. Liu, and X.-G. Xia, "Joint source-relay precoding and power allocation for secure amplify-And-forward MIMO relay networks, '' IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240-1250, Aug. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.8
, pp. 1240-1250
-
-
Wang, H.-M.1
Liu, F.2
Xia, X.-G.3
-
17
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system
-
Jan
-
C. Jeong, I.-M. Kim, and D. Kim, "Joint secure beamforming design at the source and the relay for an amplify-And-forward MIMO untrusted relay system, '' IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.3
-
18
-
-
84891354137
-
Amplify-And-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI
-
Jun
-
S. Vishwakarma and A. Chockalingam, "Amplify-And-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI, '' in Proc. IEEE Int. Conf. Commun. (ICC), Budapest, Hungry, Jun. 2013, pp. 3047-3052.
-
(2013)
Proc IEEE Int. Conf. Commun. (ICC), Budapest, Hungry
, pp. 3047-3052
-
-
Vishwakarma, S.1
Chockalingam, A.2
-
19
-
-
84912524612
-
Robust beamforming and jamming for secure AF relay networks with multiple eavesdroppers
-
Oct
-
C. Zhang, H. Gao, H. Liu, and T. Lv, "Robust beamforming and jamming for secure AF relay networks with multiple eavesdroppers, '' in Proc. IEEE Military Commun. Conf. (MILCOM), Baltimore, MD, USA, Oct. 2014, pp. 495-500.
-
(2014)
Proc IEEE Military Commun. Conf. (MILCOM), Baltimore, MD, USA
, pp. 495-500
-
-
Zhang, C.1
Gao, H.2
Liu, H.3
Lv, T.4
-
20
-
-
84879149313
-
Secure relay beamforming with imperfect channel side information
-
Jun
-
X. Wang, K. Wang, and X.-D. Zhang, "Secure relay beamforming with imperfect channel side information, '' IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol
, vol.62
, Issue.5
, pp. 2140-2155
-
-
Wang, X.1
Wang, K.2
Zhang, X.-D.3
-
21
-
-
84917671161
-
Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-Antenna multi-relay networks
-
Jan
-
Q. Li, Y. Yang, W. K. Ma, M. Lin, J. Ge, and J. Lin, "Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-Antenna multi-relay networks, '' IEEE Trans. Signal Process., vol. 63, no. 1, pp. 206-220, Jan. 2015.
-
(2015)
IEEE Trans. Signal Process
, vol.63
, Issue.1
, pp. 206-220
-
-
Li, Q.1
Yang, Y.2
Ma, W.K.3
Lin, M.4
Ge, J.5
Lin, J.6
-
22
-
-
84904303963
-
Secure beamforming design for physical layer network coding based MIMO two-way relaying
-
Jul
-
K. Jayasinghe, P. Jayasinghe, N. Rajatheva, and M. Latva-Aho, "Secure beamforming design for physical layer network coding based MIMO two-way relaying, '' IEEE Commun. Lett., vol. 18, no. 7, pp. 1270-1273, Jul. 2014.
-
(2014)
IEEE Commun. Lett
, vol.18
, Issue.7
, pp. 1270-1273
-
-
Jayasinghe, K.1
Jayasinghe, P.2
Rajatheva, N.3
Latva-Aho, M.4
-
23
-
-
84882956794
-
QoS-based source and relay secure optimization design with presence of channel uncertainty
-
Aug
-
M. Zhang, J. Huang, H. Yu, H. Luo, andW. Chen, "QoS-based source and relay secure optimization design with presence of channel uncertainty, '' IEEE Commun. Lett., vol. 17, no. 8, pp. 1544-1547, Aug. 2013.
-
(2013)
IEEE Commun. Lett
, vol.17
, Issue.8
, pp. 1544-1547
-
-
Zhang, M.1
Huang, J.2
Yu, H.3
Luo, H.4
Chen, W.5
-
24
-
-
84923299449
-
Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with deviceto-device communications
-
Feb
-
Z. Chu, K. Cumanan, M. Xu, and Z. Ding, "Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with deviceto-device communications, '' IET Commun., vol. 9, no. 3, pp. 396-403, Feb. 2015.
-
(2015)
IET Commun
, vol.9
, Issue.3
, pp. 396-403
-
-
Chu, Z.1
Cumanan, K.2
Xu, M.3
Ding, Z.4
-
25
-
-
84946240351
-
Robust joint beamforming and jamming for secure AF networks: Low-complexity design
-
May
-
C. Wang and H.-M. Wang, "Robust joint beamforming and jamming for secure AF networks: Low-complexity design, '' IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May 2015.
-
(2015)
IEEE Trans. Veh. Technol
, vol.64
, Issue.5
, pp. 2192-2198
-
-
Wang, C.1
Wang, H.-M.2
-
26
-
-
84957100456
-
Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems
-
Oct
-
H.-M. Wang, F. Liu, and M. Yang, "Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems, '' IEEE Trans. Veh. Technol., vol. 64, no. 10, pp. 4893-4898, Oct. 2015.
-
(2015)
IEEE Trans. Veh. Technol
, vol.64
, Issue.10
, pp. 4893-4898
-
-
Wang, H.-M.1
Liu, F.2
Yang, M.3
-
27
-
-
84964828308
-
Secure MIMO AF relaying design: An intercept probability constrained approach
-
Dec
-
J. Yang, B. Champagne, Q. Li, and L. Hanzo, "Secure MIMO AF relaying design: An intercept probability constrained approach, '' in Proc. IEEE Global Commun. Conf. (Globecom), San Diego, CA, USA, Dec. 2015, pp. 1-6.
-
(2015)
Proc IEEE Global Commun. Conf. (Globecom), San Diego, CA, USA
, pp. 1-6
-
-
Yang, J.1
Champagne, B.2
Li, Q.3
Hanzo, L.4
-
28
-
-
85032752455
-
Semidefinite relaxation of quadratic optimization problems
-
May
-
Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, "Semidefinite relaxation of quadratic optimization problems, '' IEEE Signal Process. Mag., vol. 27, no. 3, pp. 20-34, May 2010.
-
(2010)
IEEE Signal Process. Mag
, vol.27
, Issue.3
, pp. 20-34
-
-
Luo, Z.-Q.1
Ma, W.-K.2
So, A.M.-C.3
Ye, Y.4
Zhang, S.5
-
30
-
-
30344443099
-
A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization
-
Jan
-
A. Pascual-Iserte, D. P. Palomar, A. I. Perez-Neira, and M. A. Lagunas, "A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization, '' IEEE Trans. Signal Process., vol. 54, no. 1, pp. 346-360, Jan. 2006.
-
(2006)
IEEE Trans. Signal Process
, vol.54
, Issue.1
, pp. 346-360
-
-
Pascual-Iserte, A.1
Palomar, D.P.2
Perez-Neira, A.I.3
Lagunas, M.A.4
-
32
-
-
84923996598
-
-
1st ed. Cambridge, U.K.: Cambridge Univ. Press Aug
-
A. Goldsmith, Wireless Communications, 1st ed. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2005.
-
(2005)
Wireless Communications
-
-
Goldsmith, A.1
-
33
-
-
0033246194
-
DC programming: Overview
-
Oct
-
R. Horst and N.V. Thoai, "DC programming: Overview, '' J. Optim. Theory Appl., vol. 103, no. 1, pp. 1-43, Oct. 1999.
-
(1999)
J. Optim. Theory Appl
, vol.103
, Issue.1
, pp. 1-43
-
-
Horst, R.1
Thoai, N.V.2
-
34
-
-
84900595006
-
Joint optimization of source precoding and relay beamforming in wireless MIMO relay networks
-
Feb
-
U. Rashid, H. D. Tuan, H. H. Kha, and H. H. Nguyen, "Joint optimization of source precoding and relay beamforming in wireless MIMO relay networks, '' IEEE Trans. Commun., vol. 62, no. 2, pp. 488-499, Feb. 2014.
-
(2014)
IEEE Trans. Commun
, vol.62
, Issue.2
, pp. 488-499
-
-
Rashid, U.1
Tuan, H.D.2
Kha, H.H.3
Nguyen, H.H.4
-
35
-
-
34250270048
-
Exact penalty functions in nonlinear programming
-
Dec
-
S.-P. Han and O. L. Mangasarian, "Exact penalty functions in nonlinear programming, '' Math. Program., vol. 17, no. 1, pp. 251-269, Dec. 1979.
-
(1979)
Math. Program
, vol.17
, Issue.1
, pp. 251-269
-
-
Han, S.-P.1
Mangasarian, O.L.2
-
36
-
-
0024768569
-
Exact penalty functions in constrained optimization
-
Nov
-
G. Di Pillo and L. Grippo, "Exact penalty functions in constrained optimization, '' SIAM J. Control Optim., vol. 26, no. 6, pp. 1333-1360, Nov. 1989.
-
(1989)
SIAM J. Control Optim
, vol.26
, Issue.6
, pp. 1333-1360
-
-
Di Pillo, G.1
Grippo, L.2
-
37
-
-
49949133603
-
The Fritz John necessary optimality conditions in the presence of equality and inequality constraints
-
O. L. Mangasarian and S. Fromovitz, "The Fritz John necessary optimality conditions in the presence of equality and inequality constraints, '' J. Math. Anal. Appl., vol. 17, pp. 37-47, 1967.
-
(1967)
J. Math. Anal. Appl
, vol.17
, pp. 37-47
-
-
Mangasarian, O.L.1
Fromovitz, S.2
-
39
-
-
0030106462
-
Semidefinite programming
-
Mar
-
L. Vandenberghe and S. Boyd, "Semidefinite programming, '' SIAM Rev., vol. 38, no. 1, pp. 49-95, Mar. 1996.
-
(1996)
SIAM Rev
, vol.38
, Issue.1
, pp. 49-95
-
-
Vandenberghe, L.1
Boyd, S.2
-
40
-
-
0000261286
-
Programming with linear fractional functionals
-
Sep./Dec
-
A. Charnes and W. W. Cooper, "Programming with linear fractional functionals, '' Naval Res. Logistics Quart., vol. 9, nos. 3-4, pp. 181-186, Sep./Dec. 1962.
-
(1962)
Naval Res. Logistics Quart
, vol.9
, Issue.3-4
, pp. 181-186
-
-
Charnes, A.1
Cooper, W.W.2
-
41
-
-
0033296299
-
Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones
-
Jan
-
J. F. Sturm, "Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones, '' Optim. Methods Softw., vol. 11, nos. 1-4, pp. 625-653, Jan. 1999.
-
(1999)
Optim. Methods Softw
, vol.11
, Issue.1-4
, pp. 625-653
-
-
Sturm, J.F.1
-
44
-
-
84963787617
-
Joint optimization of transceiver matrices for MIMO-Aided multiuser AF relay networks: Improving the QoS in the presence of CSI errors
-
Mar. 2016
-
J. Yang, B. Champagne, Y. Zou, and L. Hanzo, "Joint optimization of transceiver matrices for MIMO-Aided multiuser AF relay networks: Improving the QoS in the presence of CSI errors, '' IEEE Trans. Veh. Technol., vol. 65, no. 3, pp. 1434-1451, Mar. 2016.
-
IEEE Trans. Veh. Technol
, vol.65
, Issue.3
, pp. 1434-1451
-
-
Yang, J.1
Champagne, B.2
Zou, Y.3
Hanzo, L.4
|