-
3
-
-
80052625582
-
Indoor optical wireless communication: Potential and state-of-the-art
-
Sep.
-
H. Elgala, R. Mesleh, and H. Haas, "Indoor optical wireless communication: potential and state-of-the-art," IEEE Commun. Mag., vol. 49, no. 9, pp. 56-62, Sep. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.9
, pp. 56-62
-
-
Elgala, H.1
Mesleh, R.2
Haas, H.3
-
4
-
-
84913591455
-
Visible light communications for 5g wireless networking systems: From fixed to mobile communications
-
Nov.-Dec.
-
S. Wu, H. Wang, and C.-H. Youn, "Visible light communications for 5g wireless networking systems: from fixed to mobile communications," IEEE Network, vol. 28, no. 6, pp. 41-45, Nov.-Dec. 2014.
-
(2014)
IEEE Network
, vol.28
, Issue.6
, pp. 41-45
-
-
Wu, S.1
Wang, H.2
Youn, C.-H.3
-
5
-
-
85019239935
-
The spy next door: Eavesdropping on high throughput visible light communications
-
Paris, France, Sep.
-
J. Classen, J. Chen, D. Steinmetzer, M. Hollick, and E. Knightly, "The spy next door: Eavesdropping on high throughput visible light communications," in Proc. ACM, Paris, France, Sep. 2015.
-
(2015)
Proc. ACM
-
-
Classen, J.1
Chen, J.2
Steinmetzer, D.3
Hollick, M.4
Knightly, E.5
-
6
-
-
84907685279
-
New threats and innovative protection methods in wireless transmission systems
-
Mar.
-
T. Bilski, "New threats and innovative protection methods in wireless transmission systems," J. of Telecommun. and Inf. Technology, vol. 3, pp. 26-33, Mar. 2014.
-
(2014)
J. of Telecommun. and Inf. Technology
, vol.3
, pp. 26-33
-
-
Bilski, T.1
-
7
-
-
79955372872
-
Physical layer security in wireless networks: A tutorial
-
Apr.
-
Y.-S. Shiu, S.-Y. Chang, H.-C. Wu, S. Huang, and H Chen, "Physical layer security in wireless networks: a tutorial," IEEE Wireless Commun, vol. 18, no. 2, pp. 66-74, Apr. 2011.
-
(2011)
IEEE Wireless Commun
, vol.18
, Issue.2
, pp. 66-74
-
-
Shiu, Y.-S.1
Chang, S.-Y.2
Wu, H.-C.3
Huang, S.4
Chen, H.5
-
8
-
-
84906993245
-
Physical-layer security for indoor visible light communications
-
Australia, Jun.
-
A. Mostafa and L. Lampe, "Physical-layer security for indoor visible light communications," in Proc. IEEE ICC, Sydney, Australia, Jun. 2014.
-
(2014)
Proc. IEEE ICC, Sydney
-
-
Mostafa, A.1
Lampe, L.2
-
9
-
-
84946687845
-
Securing visible light communications via friendly jamming
-
Austin, TX, USA, Dec.
-
A. Mostafa and L. Lampe, "Securing visible light communications via friendly jamming," in Proc. IEEE GLOBECOM Workshops, Austin, TX, USA, Dec. 2014.
-
(2014)
Proc. IEEE GLOBECOM Workshops
-
-
Mostafa, A.1
Lampe, L.2
-
10
-
-
84964765637
-
Improved secrecy rate of visible light communication with cooperative jamming
-
Orlando, FL, Dec.
-
H. Zaid, Z. Rezki, A. Chaaban, and M.-S. Alouini, "Improved secrecy rate of visible light communication with cooperative jamming," in Proc. IEEE GlobalSIP, Orlando, FL, Dec. 2015.
-
(2015)
Proc. IEEE GlobalSIP
-
-
Zaid, H.1
Rezki, Z.2
Chaaban, A.3
Alouini, M.-S.4
-
11
-
-
78049382115
-
Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels
-
Dallas, TX, USA, Mar.
-
J. Li and A.-P. Petropulu, "Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels," in Proc. IEEE ICASSP., Dallas, TX, USA, Mar. 2010.
-
(2010)
Proc. IEEE ICASSP.
-
-
Li, J.1
Petropulu, A.-P.2
-
12
-
-
84874091183
-
Optimality of beamforming for secrecy capacity of MIMO wiretap channels
-
Tenerife, Spain, Dec.
-
J. Li and A.-P. Petropulu, "Optimality of beamforming for secrecy capacity of MIMO wiretap channels," in Proc. IEEE WIFIS Workshop, Tenerife, Spain, Dec. 2012.
-
(2012)
Proc. IEEE WIFIS Workshop
-
-
Li, J.1
Petropulu, A.-P.2
-
13
-
-
85015395695
-
On the secrecy capacity of MISO visible light communication channels
-
Washington DC, USA, Dec.
-
Mohamed-Amine Arfaoui, Zouheir Rezki, Ali Ghrayeb, and Mohamed Slim Alouini, "On the secrecy capacity of MISO visible light communication channels," in Proc. IEEE Globecom, Washington DC, USA, Dec. 2016.
-
(2016)
Proc. IEEE Globecom
-
-
Arfaoui, M.1
Rezki, Z.2
Ghrayeb, A.3
Slim Alouini, M.4
-
14
-
-
51649110931
-
Achievable rates in Gaussian MISO channels with secrecy constraints
-
Nice, France, Jun.
-
S. Shafiee and S. Ulukus, "Achievable rates in Gaussian miso channels with secrecy constraints," in Proc. IEEE ISIT, Nice, France, Jun. 2007.
-
(2007)
Proc. IEEE ISIT
-
-
Shafiee, S.1
Ulukus, S.2
-
16
-
-
0035479933
-
Maximization of the ratio of two convex quadratic functions over a polytope
-
Oct.
-
J.-Y. Gotoh and H. Konno, "Maximization of the ratio of two convex quadratic functions over a polytope," Computational Optimization and Applicat., vol. 20, no. 1, pp. 43-60, Oct. 2001.
-
(2001)
Computational Optimization and Applicat.
, vol.20
, Issue.1
, pp. 43-60
-
-
Gotoh, J.-Y.1
Konno, H.2
-
17
-
-
33646509685
-
Fractional programming with convex quadratic forms and functions
-
Sep.
-
H.-P. Benson, "Fractional programming with convex quadratic forms and functions," European J. of Operational Research, vol. 173, no. 2, pp. 351-369, Sep. 2006.
-
(2006)
European J. of Operational Research
, vol.173
, Issue.2
, pp. 351-369
-
-
Benson, H.-P.1
-
18
-
-
85019214746
-
Robust beamforming for MISO wiretap channel by optimizing the worst-case secrecy capacity
-
CA, Nov.
-
W. Shi and J. Ritcey, "Robust beamforming for miso wiretap channel by optimizing the worst-case secrecy capacity," in Proc. IEEE ASILOMAR, Pacific Grove, CA, Nov. 2010.
-
(2010)
Proc. IEEE ASILOMAR, Pacific Grove
-
-
Shi, W.1
Ritcey, J.2
|