-
2
-
-
0024012644
-
An introduction to contemporary cryptology
-
May
-
J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
-
(1988)
Proc. IEEE
, vol.76
, Issue.5
, pp. 533-549
-
-
Massey, J.L.1
-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
4
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
5
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
6
-
-
84933048120
-
The challenges facing physical layer security
-
Jun.
-
W. Trappe, "The challenges facing physical layer security," IEEE Commun. Mag., vol. 53, no. 6, pp. 16-20, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 16-20
-
-
Trappe, W.1
-
7
-
-
80053941690
-
Achieving the secrecy capacity of wiretap channels using polar codes
-
Oct.
-
H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.10
, pp. 6428-6443
-
-
Mahdavifar, H.1
Vardy, A.2
-
8
-
-
85020445713
-
LDPC codes for the Gaussian wiretap channels
-
Aug.
-
D. Klinc, J. Ha, S. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channels," IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933-2945, Aug. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Klinc, D.1
Ha, J.2
McLaughlin, S.3
Barros, J.4
Kwak, B.-J.5
-
9
-
-
84923287820
-
On the secrecy capacity of block fading channels with a hybrid adversary
-
Mar.
-
Y. O. Basciftci, O. Gungor, C. E. Koksal, and F. Ozguner, "On the secrecy capacity of block fading channels with a hybrid adversary," IEEE Trans. Inf. Theory, vol. 61, no. 3, pp. 1325-1343, Mar. 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.3
, pp. 1325-1343
-
-
Basciftci, Y.O.1
Gungor, O.2
Koksal, C.E.3
Ozguner, F.4
-
10
-
-
84903209092
-
On the physical layer security of backscatter wireless systems
-
Jun.
-
W. Saad, X. Zhou, Z. Han, and H. V. Poor, "On the physical layer security of backscatter wireless systems," IEEE Trans. Wireless Commun., vol. 13, no. 6, pp. 3442-3451, Jun. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.6
, pp. 3442-3451
-
-
Saad, W.1
Zhou, X.2
Han, Z.3
Poor, H.V.4
-
11
-
-
39049144353
-
Secrecy capacity of wireless channels
-
Seattle, WA, USA, Jul.
-
J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE ISIT, Seattle, WA, USA, Jul. 2006, pp. 356-360.
-
(2006)
Proc. IEEE ISIT
, pp. 356-360
-
-
Barros, J.1
Rodrigues, M.R.D.2
-
12
-
-
79952822109
-
Bounds on secrecy capacity over correlated ergodic fading channels at high SNR
-
Apr.
-
H. Jeon, N. Kim, J. Choi, H. Lee, and J. Ha, "Bounds on secrecy capacity over correlated ergodic fading channels at high SNR," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 1975-1983, Apr. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 1975-1983
-
-
Jeon, H.1
Kim, N.2
Choi, J.3
Lee, H.4
Ha, J.5
-
13
-
-
77951561698
-
Optimum power allocation against information leakage in wireless network
-
Honolulu, HI, USA, Dec.
-
S. Bashar and Z. Ding, "Optimum power allocation against information leakage in wireless network," in Proc. IEEE GLOBECOM, Honolulu, HI, USA, Dec. 2009, pp. 1-6.
-
(2009)
Proc. IEEE GLOBECOM
, pp. 1-6
-
-
Bashar, S.1
Ding, Z.2
-
14
-
-
80051775150
-
Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
-
Sep.
-
X. Wang, M. Tao, J. Mo, and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 693-702, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 693-702
-
-
Wang, X.1
Tao, M.2
Mo, J.3
Xu, Y.4
-
15
-
-
84907003935
-
On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI
-
Sydney, NSW, Australia, Jun.
-
X. Chen, L. Lei, H. Zhang, and C. Yuen, "On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI," in Proc. IEEE ICC, Sydney, NSW, Australia, Jun. 2014, pp. 2052-2057.
-
(2014)
Proc. IEEE ICC
, pp. 2052-2057
-
-
Chen, X.1
Lei, L.2
Zhang, H.3
Yuen, C.4
-
16
-
-
84871984718
-
Cooperative jamming for secrecy in decentralized wireless networks
-
Ottawa, ON, Canada, Jun.
-
X. Zhou, M. Tao, and R. A. Kennedy, "Cooperative jamming for secrecy in decentralized wireless networks," in Proc. IEEE ICC, Ottawa, ON, Canada, Jun. 2012, pp. 2339-2344.
-
(2012)
Proc. IEEE ICC
, pp. 2339-2344
-
-
Zhou, X.1
Tao, M.2
Kennedy, R.A.3
-
17
-
-
84888875254
-
Security enhancement in cooperative jamming using compromised secrecy region minimization
-
Toronto, ON, Canada, Jun.
-
H. Li, X. Wang, and W. Hou, "Security enhancement in cooperative jamming using compromised secrecy region minimization," in Proc. CWIT, Toronto, ON, Canada, Jun. 2013, pp. 214-218.
-
(2013)
Proc. CWIT
, pp. 214-218
-
-
Li, H.1
Wang, X.2
Hou, W.3
-
18
-
-
85032751776
-
Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Sep.
-
Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.-W.P.1
Lan, P.-C.2
Kuo, C.-C.J.3
-
19
-
-
69449086815
-
Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
-
Sep.
-
S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.9
, pp. 4033-4039
-
-
Shafiee, S.1
Liu, N.2
Ulukus, S.3
-
20
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
21
-
-
66949180834
-
A note on the secrecy capacity of the multipleantenna wiretap channel
-
Jun.
-
T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Theory
, vol.55
, Issue.6
, pp. 2547-2553
-
-
Liu, T.1
Shamai, S.2
-
22
-
-
84899112732
-
Secure transmission using MIMO precoding
-
May
-
C.-H. Lin, S.-H. Tsai, and Y.-P. Lin, "Secure transmission using MIMO precoding," IEEE Trans. Inf. Forensics Security, vol. 9, no. 5, pp. 801-813, May 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.5
, pp. 801-813
-
-
Lin, C.-H.1
Tsai, S.-H.2
Lin, Y.-P.3
-
23
-
-
84872184553
-
Physical layer security of TAS/MRC with antenna correlation
-
Jan.
-
N. Yang, H. A. Suraweera, I. B. Collings, and C. Yuen, "Physical layer security of TAS/MRC with antenna correlation," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 254-259, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.1
, pp. 254-259
-
-
Yang, N.1
Suraweera, H.A.2
Collings, I.B.3
Yuen, C.4
-
24
-
-
80051619768
-
Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI
-
Prague, Czech Republic, May
-
J. Huang and A. L. Swindlehurst, "Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI," in Proc. IEEE ICASSP, Prague, Czech Republic, May 2011, pp. 3424-3427.
-
(2011)
Proc. IEEE ICASSP
, pp. 3424-3427
-
-
Huang, J.1
Swindlehurst, A.L.2
-
25
-
-
84922569391
-
Energy-efficient power allocation for secure communications in large-scale MIMO relaying systems
-
Shanghai, China, Oct.
-
J. Chen, X. Chen, T. Liu, and L. Lei, "Energy-efficient power allocation for secure communications in large-scale MIMO relaying systems," in Proc. IEEE ICCC, Shanghai, China, Oct. 2014, pp. 385-390.
-
(2014)
Proc. IEEE ICCC
, pp. 385-390
-
-
Chen, J.1
Chen, X.2
Liu, T.3
Lei, L.4
-
26
-
-
72349099904
-
Cooperative jamming for wireless physical layer security
-
Aug./Sep.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Cooperative jamming for wireless physical layer security," in Proc. IEEE SSP, Aug./Sep. 2009, pp. 417-420.
-
(2009)
Proc. IEEE SSP
, pp. 417-420
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
27
-
-
84880157215
-
Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdropper
-
Jun.
-
J. Yang, I.-M. Kim, and D. I. Kim, "Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdropper," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2840-2852, Jun. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.6
, pp. 2840-2852
-
-
Yang, J.1
Kim, I.-M.2
Kim, D.I.3
-
28
-
-
84890121948
-
Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback
-
Oct.
-
X. Chen and R. Yin, "Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback," IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503-506, Oct. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.5
, pp. 503-506
-
-
Chen, X.1
Yin, R.2
-
29
-
-
84888354468
-
Rate regions for multiple access channel with conference and secrecy constraints
-
Dec.
-
P. Xu, Z. Ding, and X. Dai, "Rate regions for multiple access channel with conference and secrecy constraints," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1961-1974, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 1961-1974
-
-
Xu, P.1
Ding, Z.2
Dai, X.3
-
30
-
-
84933037312
-
Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
-
Jun.
-
D. Kapetanovic, G. Zheng, and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks," IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 21-27
-
-
Kapetanovic, D.1
Zheng, G.2
Rusek, F.3
-
31
-
-
84969988437
-
Resource allocation for a massive MIMO relay aided secure communication
-
Aug.
-
J. Chen, X. Chen, W. H. Gerstacker, and D. W. K. Ng, "Resource allocation for a massive MIMO relay aided secure communication," IEEE Trans. Inf. Forensics Security, vol. 11, no. 8, pp. 1700-1711, Aug. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.8
, pp. 1700-1711
-
-
Chen, J.1
Chen, X.2
Gerstacker, W.H.3
Ng, D.W.K.4
-
32
-
-
84883296165
-
Antenna subset modulation for secure millimeter-wave wireless communication
-
Aug.
-
N. Valliappan, A. Lozano, and R. W. Heath, Jr., "Antenna subset modulation for secure millimeter-wave wireless communication," IEEE Trans. Commun., vol. 61, no. 8, pp. 3231-3245, Aug. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.8
, pp. 3231-3245
-
-
Valliappan, N.1
Lozano, A.2
Heath, R.W.3
-
33
-
-
84855424848
-
Dual-beam directional modulation technique for physical-layer secure communication
-
T. Hong, M.-Z. Song, and Y. Liu, "Dual-beam directional modulation technique for physical-layer secure communication," IEEE Antennas Wireless Propag. Lett., vol. 10, pp. 1417-1420, 2011.
-
(2011)
IEEE Antennas Wireless Propag. Lett.
, vol.10
, pp. 1417-1420
-
-
Hong, T.1
Song, M.-Z.2
Liu, Y.3
-
34
-
-
84947766084
-
On directional modulation: An analysis of transmission scheme with multiple direction
-
London, U.K., Jun.
-
M. Hafez and H. Arslan, "On directional modulation: An analysis of transmission scheme with multiple direction," in Proc. IEEE ICCW, London, U.K., Jun. 2015, pp. 459-463.
-
(2015)
Proc. IEEE ICCW
, pp. 459-463
-
-
Hafez, M.1
Arslan, H.2
-
35
-
-
84964553490
-
Secure multi-user transmission using CoMP directional modulation
-
Boston, MA, USA, Sep.
-
M. Yusuf and H. Arslan, "Secure multi-user transmission using CoMP directional modulation," in Proc. IEEE VTC Fall, Boston, MA, USA, Sep. 2015, pp. 1-2.
-
(2015)
Proc. IEEE VTC Fall
, pp. 1-2
-
-
Yusuf, M.1
Arslan, H.2
-
36
-
-
80051966419
-
On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint
-
Kyoto, Japan, Jun.
-
Z. Rezki and M.-S. Alouini, "On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint," in Proc. IEEE ICC, Kyoto, Japan, Jun. 2011, pp. 1-5.
-
(2011)
Proc. IEEE ICC
, pp. 1-5
-
-
Rezki, Z.1
Alouini, M.-S.2
-
37
-
-
84893242895
-
Linear MMSE transceiver optimization for general MIMO wiretap channels with QoS constraints
-
Xi'an, China, Aug.
-
M. Pei, L. Wang, and D. Ma, "Linear MMSE transceiver optimization for general MIMO wiretap channels with QoS constraints," in Proc. IEEE/CIC ICCC, Xi'an, China, Aug. 2013, pp. 259-263.
-
(2013)
Proc. IEEE/CIC ICCC
, pp. 259-263
-
-
Pei, M.1
Wang, L.2
Ma, D.3
-
38
-
-
51649117832
-
On the Gaussian MIMO wiretap channel
-
Nice, France, Jun.
-
A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. IEEE ISIT, Nice, France, Jun. 2007, pp. 2471-2475.
-
(2007)
Proc. IEEE ISIT
, pp. 2471-2475
-
-
Khisti, A.1
Wornell, G.2
Wiesel, A.3
Eldar, Y.4
-
39
-
-
84947706998
-
Tomlinson-Harashima precoding design in MIMO wiretap channels based on the MMSE criterion
-
London U.K., Jun.
-
L. Zhang, Y. Cai, B. Champagne, and M. Zhao, "Tomlinson-Harashima precoding design in MIMO wiretap channels based on the MMSE criterion," in Proc. IEEE ICCW, London U.K., Jun. 2015, pp. 470-474.
-
(2015)
Proc. IEEE ICCW
, pp. 470-474
-
-
Zhang, L.1
Cai, Y.2
Champagne, B.3
Zhao, M.4
-
40
-
-
77955683763
-
MIMO Gaussian broadcast channels with confidential and common messages
-
Austin, TX, USA, Jun.
-
R. Liu, T. Liu, H. V. Poor, and S. Shamai, "MIMO Gaussian broadcast channels with confidential and common messages," in Proc. IEEE ISIT, Austin, TX, USA, Jun. 2010, pp. 2578-2582.
-
(2010)
Proc. IEEE ISIT
, pp. 2578-2582
-
-
Liu, R.1
Liu, T.2
Poor, H.V.3
Shamai, S.4
-
41
-
-
84555190397
-
Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
-
Jan.
-
C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.1
, pp. 310-325
-
-
Jeong, C.1
Kim, I.-M.2
Kim, D.I.3
-
42
-
-
84864360496
-
On optimal artificialnoise assisted secure beamforming for the multiple-input multipleoutput fading eavesdropper channel
-
Paris, France, Apr.
-
S.-H. Lai, P.-H. Lin, S.-C. Lin, and H.-J. Su, "On optimal artificialnoise assisted secure beamforming for the multiple-input multipleoutput fading eavesdropper channel," in Proc. IEEE WCNC, Paris, France, Apr. 2012, pp. 513-517.
-
(2012)
Proc. IEEE WCNC
, pp. 513-517
-
-
Lai, S.-H.1
Lin, P.-H.2
Lin, S.-C.3
Su, H.-J.4
-
43
-
-
84881572098
-
Secure beamforming for MIMO two-way transmission with an untrusted relay
-
Shanghai, China, Apr.
-
J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, "Secure beamforming for MIMO two-way transmission with an untrusted relay," in Proc. IEEE WCNC, Shanghai, China, Apr. 2013, pp. 4180-4185.
-
(2013)
Proc. IEEE WCNC
, pp. 4180-4185
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Xia, B.4
Ma, X.5
-
44
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Jan.
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.C.5
-
45
-
-
79551619462
-
Secure communications via cooperative jamming in two-hop relay systems
-
Miami, FL, USA, Dec.
-
J. Huang and A. L. Swindlehurst, "Secure communications via cooperative jamming in two-hop relay systems," in Proc. IEEE GLOBECOM, Miami, FL, USA, Dec. 2010, pp. 1-5.
-
(2010)
Proc. IEEE GLOBECOM
, pp. 1-5
-
-
Huang, J.1
Swindlehurst, A.L.2
-
46
-
-
13444305231
-
On the capacity of MIMO broadcast channels with partial side information
-
Feb.
-
M. Sharif and B. Hassibi, "On the capacity of MIMO broadcast channels with partial side information," IEEE Trans. Inf. Theory, vol. 51, no. 2, pp. 506-522, Feb. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.2
, pp. 506-522
-
-
Sharif, M.1
Hassibi, B.2
-
47
-
-
77951525553
-
On distributed antenna systems with limited feedback precoding: Opportunities and challenges
-
Apr.
-
X. Chen, Z. Zhang, and H.-H. Chen, "On distributed antenna systems with limited feedback precoding: Opportunities and challenges," IEEE Wireless Commun., vol. 17, no. 2, pp. 80-88, Apr. 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.2
, pp. 80-88
-
-
Chen, X.1
Zhang, Z.2
Chen, H.-H.3
-
48
-
-
84924410728
-
Wireless physical layer security with imperfect channel state information: A survey
-
Sep.
-
B. He, X. Zhou, and T. D. Abhayapala, "Wireless physical layer security with imperfect channel state information: A survey," ZTE Commun., vol. 11, no. 3, pp. 11-19, Sep. 2013.
-
(2013)
ZTE Commun.
, vol.11
, Issue.3
, pp. 11-19
-
-
He, B.1
Zhou, X.2
Abhayapala, T.D.3
-
49
-
-
79955465834
-
On ergodic secrecy rate for Gaussian MISO wiretap channels
-
Apr.
-
J. Li and A. P. Petropulu, "On ergodic secrecy rate for Gaussian MISO wiretap channels," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1176-1187, Apr. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.4
, pp. 1176-1187
-
-
Li, J.1
Petropulu, A.P.2
-
50
-
-
80051720840
-
Ergodic secrecy rate for multiple-antenna wiretap channels with Rician fading
-
Sep.
-
J. Li and A. P. Petropulu, "Ergodic secrecy rate for multiple-antenna wiretap channels with Rician fading," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 861-867, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 861-867
-
-
Li, J.1
Petropulu, A.P.2
-
51
-
-
84933041310
-
Practical transmission scheme with fixed communication rate under constraints of transmit power and secrecy outage probability
-
Jun.
-
Z. Li, P. Mu, B. Wang, and X. Hu, "Practical transmission scheme with fixed communication rate under constraints of transmit power and secrecy outage probability," IEEE Commun. Lett., vol. 19, no. 6, pp. 1057-1060, Jun. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.6
, pp. 1057-1060
-
-
Li, Z.1
Mu, P.2
Wang, B.3
Hu, X.4
-
52
-
-
80051744719
-
On wireless channels with Mantenna eavesdroppers: Characterization of the outage probability and ϵ-outage secrecy capacity
-
Sep.
-
V. U. Prabhu and M. R. D. Rodrigues, "On wireless channels with Mantenna eavesdroppers: Characterization of the outage probability and ϵ-outage secrecy capacity," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 853-860, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 853-860
-
-
Prabhu, V.U.1
Rodrigues, M.R.D.2
-
53
-
-
84891356286
-
Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack
-
Budapest, Hungary, Jun.
-
Y. Zou, X. Wang, and W. Shen, "Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack," in Proc. IEEE ICC, Budapest, Hungary, Jun. 2013, pp. 2183-2187.
-
(2013)
Proc. IEEE ICC
, pp. 2183-2187
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
54
-
-
84921832973
-
Improving physicallayer security in wireless communications using diversity techniques
-
Jan./Feb.
-
Y. Zou, J. Zhu, X. Wang, and V. C. M. Leung, "Improving physicallayer security in wireless communications using diversity techniques," IEEE Netw., vol. 29, no. 1, pp. 42-48, Jan./Feb. 2015.
-
(2015)
IEEE Netw.
, vol.29
, Issue.1
, pp. 42-48
-
-
Zou, Y.1
Zhu, J.2
Wang, X.3
Leung, V.C.M.4
-
55
-
-
84877684169
-
Secrecy diversity in MISOME wiretap channel
-
Anaheim, CA, USA, Dec.
-
T. V. Nguyen, T. Q. S. Quek, Y. H. Kim, and H. Shin, "Secrecy diversity in MISOME wiretap channel," in Proc. IEEE GLOBECOM, Anaheim, CA, USA, Dec. 2012, pp. 4840-4845.
-
(2012)
Proc. IEEE GLOBECOM
, pp. 4840-4845
-
-
Nguyen, T.V.1
Quek, T.Q.S.2
Kim, Y.H.3
Shin, H.4
-
56
-
-
84919667792
-
Secrecy outage and diversity analysis of cognitive radio systems
-
Nov.
-
Y. Zou, X. Li, and Y.-C. Liang, "Secrecy outage and diversity analysis of cognitive radio systems," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2222-2236, Nov. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.11
, pp. 2222-2236
-
-
Zou, Y.1
Li, X.2
Liang, Y.-C.3
-
57
-
-
84880521772
-
MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom
-
Aug.
-
X. He, A. Khisti, and A. Yener, "MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom," IEEE Trans. Inf. Theory, vol. 59, no. 8, pp. 4733-4745, Aug. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.8
, pp. 4733-4745
-
-
He, X.1
Khisti, A.2
Yener, A.3
-
58
-
-
80051774469
-
On the secrecy degrees of freedom of the multiantenna block fading wiretap channels
-
Sep.
-
M. Kobayashi, P. Piantanida, S. Yang, and S. Shamai, "On the secrecy degrees of freedom of the multiantenna block fading wiretap channels," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 703-711, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 703-711
-
-
Kobayashi, M.1
Piantanida, P.2
Yang, S.3
Shamai, S.4
-
59
-
-
84953725257
-
Optimal power allocation for secure communications in large-scale MIMO relaying systems
-
London U.K., Jun.
-
J. Chen, X. Chen, X. Wang, and L. Lei, "Optimal power allocation for secure communications in large-scale MIMO relaying systems," in Proc. IEEE ICC, London U.K., Jun. 2015, pp. 1801-1806.
-
(2015)
Proc. IEEE ICC
, pp. 1801-1806
-
-
Chen, J.1
Chen, X.2
Wang, X.3
Lei, L.4
-
60
-
-
84877718412
-
Secure communication via an untrusted non-regenerative relay in fading channels
-
May
-
J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2536-2550
-
-
Huang, J.1
Mukherjee, A.2
Swindlehurst, A.L.3
-
61
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
3rd Quart.
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, 3rd Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
62
-
-
0017996501
-
The Gaussian wiretap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wiretap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
63
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
64
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
65
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
66
-
-
77958560746
-
Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
67
-
-
84877752784
-
Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
-
May
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2620-2631
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
68
-
-
84883395356
-
Transmit solutions for MIMO wiretap channels using alternating optimization
-
Sep.
-
Q. Li et al., "Transmit solutions for MIMO wiretap channels using alternating optimization," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1714-1727, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1714-1727
-
-
Li, Q.1
-
69
-
-
84903554995
-
Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper
-
May
-
K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.4
, pp. 1678-1690
-
-
Cumanan, K.1
Ding, Z.2
Sharif, B.3
Tian, G.Y.4
Leung, K.K.5
-
70
-
-
84863908572
-
Linear precoding for finite-alphabet signaling over MIMOME wiretap channels
-
Jul.
-
Y. Wu, C. Xiao, Z. Ding, X. Gao, and S. Jin, "Linear precoding for finite-alphabet signaling over MIMOME wiretap channels," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2599-2612, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2599-2612
-
-
Wu, Y.1
Xiao, C.2
Ding, Z.3
Gao, X.4
Jin, S.5
-
71
-
-
84880560795
-
Filter design with secrecy constraints: The MIMO Gaussian wiretap channel
-
Aug.
-
H. Reboredo, J. Xavier, and M. R. D. Rodrigues, "Filter design with secrecy constraints: The MIMO Gaussian wiretap channel," IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3799-3814, Aug. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.15
, pp. 3799-3814
-
-
Reboredo, H.1
Xavier, J.2
Rodrigues, M.R.D.3
-
72
-
-
84907205584
-
Energy-efficient precoder design for MIMO wiretap channels
-
Sep.
-
H. Zhang, Y. Huang, S. Li, and L. Yang, "Energy-efficient precoder design for MIMO wiretap channels," IEEE Commun. Lett., vol. 18, no. 9, pp. 1559-1562, Sep. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.9
, pp. 1559-1562
-
-
Zhang, H.1
Huang, Y.2
Li, S.3
Yang, L.4
-
73
-
-
84860014980
-
Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR
-
Apr.
-
Z. Rezki and M.-S. Alouini, "Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR," IEEE Trans. Commun., vol. 60, no. 4, pp. 1138-1147, Apr. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.4
, pp. 1138-1147
-
-
Rezki, Z.1
Alouini, M.-S.2
-
74
-
-
54249161889
-
An overview of limited feedback in wireless communication systems
-
Oct.
-
D. J. Love et al., "An overview of limited feedback in wireless communication systems," IEEE J. Sel. Areas Commun., vol. 26, no. 8, pp. 1341-1365, Oct. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.8
, pp. 1341-1365
-
-
Love, D.J.1
-
75
-
-
84862266995
-
Finite-signal-to-noise ratio diversitymultiplexing-rate trade-off in limited feedback beamforming systems with imperfect channel state information
-
May
-
X. Chen, Z. Zhang, and S. Chen, "Finite-signal-to-noise ratio diversitymultiplexing-rate trade-off in limited feedback beamforming systems with imperfect channel state information," IET Commun., vol. 6, no. 7, pp. 751-758, May 2012.
-
(2012)
IET Commun.
, vol.6
, Issue.7
, pp. 751-758
-
-
Chen, X.1
Zhang, Z.2
Chen, S.3
-
76
-
-
33646022204
-
Design and analysis of transmitbeamforming based on limited-rate feedback
-
May
-
P. Xia and G. B. Giannakis, "Design and analysis of transmitbeamforming based on limited-rate feedback," IEEE Trans. Signal Process., vol. 54, no. 5, pp. 1853-1863, May 2006.
-
(2006)
IEEE Trans. Signal Process.
, vol.54
, Issue.5
, pp. 1853-1863
-
-
Xia, P.1
Giannakis, G.B.2
-
77
-
-
33645318181
-
Fast transfer of channel state information in wireless systems
-
Apr.
-
T. L. Marzetta and B. M. Hochwald, "Fast transfer of channel state information in wireless systems," IEEE Trans. Signal Process., vol. 54, no. 4, pp. 1268-1278, Apr. 2006.
-
(2006)
IEEE Trans. Signal Process.
, vol.54
, Issue.4
, pp. 1268-1278
-
-
Marzetta, T.L.1
Hochwald, B.M.2
-
78
-
-
80052071600
-
Training and feedback optimization for multiuser MIMO downlink
-
Aug.
-
M. Kobayashi, N. Jindal, and G. Caire, "Training and feedback optimization for multiuser MIMO downlink," IEEE Trans. Commun., vol. 59, no. 8, pp. 2228-2240, Aug. 2011.
-
(2011)
IEEE Trans. Commun.
, vol.59
, Issue.8
, pp. 2228-2240
-
-
Kobayashi, M.1
Jindal, N.2
Caire, G.3
-
79
-
-
77955288031
-
How much feedback is required for TDD multi-antenna broadcast channels with user selection?
-
U. Salim and D. Slock, "How much feedback is required for TDD multi-antenna broadcast channels with user selection?" EURASIP J. Adv. Signal Process., vol. 2010, pp. 1-14, 2010.
-
(2010)
EURASIP J. Adv. Signal Process.
, vol.2010
, pp. 1-14
-
-
Salim, U.1
Slock, D.2
-
80
-
-
77954592247
-
Secure communications with insecure feedback: Breaking the high-SNR ceiling
-
Aug.
-
T. T. Kim and H. V. Poor, "Secure communications with insecure feedback: Breaking the high-SNR ceiling," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3700-3711, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3700-3711
-
-
Kim, T.T.1
Poor, H.V.2
-
81
-
-
84923886792
-
Robust outage secrecy rate optimizations for a MIMO secrecy channel
-
Feb.
-
Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. L. Goff, "Robust outage secrecy rate optimizations for a MIMO secrecy channel," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 86-89, Feb. 2015.
-
(2015)
IEEE Wireless Commun. Lett.
, vol.4
, Issue.1
, pp. 86-89
-
-
Chu, Z.1
Cumanan, K.2
Ding, Z.3
Johnston, M.4
Goff, S.L.5
-
82
-
-
79960433598
-
Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
-
Aug.
-
Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.8
, pp. 3799-3812
-
-
Li, Q.1
Ma, W.-K.2
-
83
-
-
79955484022
-
On secrecy of codebook-based transmission beamforming under receiver limited feedback
-
Apr.
-
S. Bashar, Z. Ding, and G. Y. Li, "On secrecy of codebook-based transmission beamforming under receiver limited feedback," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1212-1223, Apr. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.4
, pp. 1212-1223
-
-
Bashar, S.1
Ding, Z.2
Li, G.Y.3
-
84
-
-
84878730663
-
Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection
-
May
-
N. S. Ferdinand, D. B. Da Costa, and M. Latva-Aho, "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection," IEEE Commun. Lett., vol. 17, no. 5, pp. 864-867, May 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.5
, pp. 864-867
-
-
Ferdinand, N.S.1
Da Costa, D.B.2
Latva-Aho, M.3
-
85
-
-
84903310105
-
On secrecy capacity of fast fading MIMOME wiretap channels with statistical CSIT
-
Jun.
-
S.-C. Lin and C.-L. Lin, "On secrecy capacity of fast fading MIMOME wiretap channels with statistical CSIT," IEEE Trans. Wireless Commun., vol. 13, no. 6, pp. 3293-3306, Jun. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.6
, pp. 3293-3306
-
-
Lin, S.-C.1
Lin, C.-L.2
-
86
-
-
84929353100
-
Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere
-
May
-
T.-Y. Liu, P. Mukherjee, S. Ulukus, S.-C. Lin, and Y.-W. P. Hong, "Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2655-2669, May 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.5
, pp. 2655-2669
-
-
Liu, T.-Y.1
Mukherjee, P.2
Ulukus, S.3
Lin, S.-C.4
Hong, Y.-W.P.5
-
87
-
-
82155167606
-
Power allocation and achievable secrecy rates in MISOME wiretap channels
-
Nov.
-
T. V. Nguyen and H. Shin, "Power allocation and achievable secrecy rates in MISOME wiretap channels," IEEE Commun. Lett., vol. 15, no. 11, pp. 1196-1198, Nov. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.11
, pp. 1196-1198
-
-
Nguyen, T.V.1
Shin, H.2
-
88
-
-
84897913176
-
Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels
-
Mar.
-
S. Yan, N. Yang, R. Malaney, and J. Yuan, "Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1656-1667, Mar. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.3
, pp. 1656-1667
-
-
Yan, S.1
Yang, N.2
Malaney, R.3
Yuan, J.4
-
89
-
-
84877584209
-
Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee
-
Apr.
-
X. Chen and L. Lei, "Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee," IEEE Commun. Lett., vol. 17, no. 4, pp. 637-640, Apr. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.4
, pp. 637-640
-
-
Chen, X.1
Lei, L.2
-
90
-
-
84953398383
-
Secrecy and energy efficiency in MIMO-ME systems
-
Stockholm, Sweden, Jun./Jul.
-
A. Zappone, P.-H. Lin, and E. A. Jorswieck, "Secrecy and energy efficiency in MIMO-ME systems," in Proc. IEEE SPAWC, Stockholm, Sweden, Jun./Jul. 2015, pp. 380-384.
-
(2015)
Proc. IEEE SPAWC
, pp. 380-384
-
-
Zappone, A.1
Lin, P.-H.2
Jorswieck, E.A.3
-
91
-
-
84863941590
-
Energy-efficient resource allocation for secure OFDMA systems
-
Jul.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2572-2585, Jul. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.6
, pp. 2572-2585
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
92
-
-
84943372153
-
Exploiting large-scale MIMO techniques for physical layer security with imperfect channel state information
-
Austin, TX, USA, Dec.
-
X. Chen, C. Yuen, and Z. Zhang, "Exploiting large-scale MIMO techniques for physical layer security with imperfect channel state information," in Proc. IEEE GLOBECOM, Austin, TX, USA, Dec. 2014, pp. 1648-1653.
-
(2014)
Proc. IEEE GLOBECOM
, pp. 1648-1653
-
-
Chen, X.1
Yuen, C.2
Zhang, Z.3
-
93
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
94
-
-
84881111045
-
Practical secrecy using artificial noise
-
Jul.
-
S. Liu, Y. Hong, and E. Viterbo, "Practical secrecy using artificial noise," IEEE Commun. Lett., vol. 17, no. 7, pp. 1483-1486, Jul. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.7
, pp. 1483-1486
-
-
Liu, S.1
Hong, Y.2
Viterbo, E.3
-
95
-
-
84883698532
-
On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
-
Sep.
-
P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1728-1740, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1728-1740
-
-
Lin, P.-H.1
Lai, S.-H.2
Lin, S.-C.3
Su, H.-J.4
-
96
-
-
84866621680
-
A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap channels via masked beamforming
-
Sep.
-
J. Xiong, K.-K. Wong, D. Ma, and J. Wei, "A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap channels via masked beamforming," IEEE Commun. Lett., vol. 16, no. 9, pp. 1496-1499, Sep. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.9
, pp. 1496-1499
-
-
Xiong, J.1
Wong, K.-K.2
Ma, D.3
Wei, J.4
-
97
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
-
May
-
Q. Li and W.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.-K.2
-
98
-
-
84930227002
-
Artificial noise: Transmission optimization in multi-input single-output wiretap channels
-
May
-
N. Yang et al., "Artificial noise: Transmission optimization in multi-input single-output wiretap channels," IEEE Trans. Commun., vol. 63, no. 5, pp. 1771-1783, May 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.5
, pp. 1771-1783
-
-
Yang, N.1
-
99
-
-
84890426484
-
Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty
-
Nov.
-
Y. Tang, J. Xiong, D. Ma, and X. Zhang, "Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty," IEEE Commun. Lett., vol. 17, no. 11, pp. 2096-2099, Nov. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.11
, pp. 2096-2099
-
-
Tang, Y.1
Xiong, J.2
Ma, D.3
Zhang, X.4
-
100
-
-
84921324940
-
Secrecy rate maximization with artificialnoise-aided beamforming for MISO wiretap channels under secrecy outage constraint
-
Jan.
-
B. Wang, P. Mu, and Z. Li, "Secrecy rate maximization with artificialnoise-aided beamforming for MISO wiretap channels under secrecy outage constraint," IEEE Commun. Lett., vol. 19, no. 1, pp. 18-21, Jan. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.1
, pp. 18-21
-
-
Wang, B.1
Mu, P.2
Li, Z.3
-
101
-
-
84903291683
-
Power allocation for artificial-noise secure MIMO precoding systems
-
Jul.
-
S.-H. Tsai and H. V. Poor, "Power allocation for artificial-noise secure MIMO precoding systems," IEEE Trans. Signal Process., vol. 62, no. 13, pp. 3479-3493, Jul. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.13
, pp. 3479-3493
-
-
Tsai, S.-H.1
Poor, H.V.2
-
102
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct.
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol.
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
103
-
-
84879203277
-
On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels
-
Jun.
-
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
104
-
-
79952985755
-
On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
-
Mar.
-
S.-C. Lin, T.-H. Chang, Y.-L. Liang, Y.-W. P. Hong, and C.-Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.3
, pp. 901-915
-
-
Lin, S.-C.1
Chang, T.-H.2
Liang, Y.-L.3
Hong, Y.-W.P.4
Chi, C.-Y.5
-
105
-
-
84929330256
-
Artificialnoise-aided secure multi-antenna transmission with limited feedback
-
May
-
X. Zhang, M. R. McKay, X. Zhou, and R. W. Heath, Jr., "Artificialnoise-aided secure multi-antenna transmission with limited feedback," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2742-2754, May 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.5
, pp. 2742-2754
-
-
Zhang, X.1
McKay, M.R.2
Zhou, X.3
Heath, R.W.4
-
106
-
-
85008520301
-
Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation
-
Aug.
-
Y. Yang, W. Wang, H. Zhao, and L. Zhao, "Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation," J. Commun. Netw., vol. 14, no. 4, pp. 374-384, Aug. 2012.
-
(2012)
J. Commun. Netw.
, vol.14
, Issue.4
, pp. 374-384
-
-
Yang, Y.1
Wang, W.2
Zhao, H.3
Zhao, L.4
-
107
-
-
84867873837
-
Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
-
Oct.
-
W. Li, M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.10
, pp. 1628-1631
-
-
Li, W.1
Ghogho, M.2
Chen, B.3
Xiong, C.4
-
108
-
-
84899797495
-
Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization
-
Jul.
-
Y. Zhou, Z. Z. Xiang, Y. Zhu, and Z. Xue, "Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization," IEEE Signal Process. Lett., vol. 21, no. 7, pp. 804-808, Jul. 2014.
-
(2014)
IEEE Signal Process. Lett.
, vol.21
, Issue.7
, pp. 804-808
-
-
Zhou, Y.1
Xiang, Z.Z.2
Zhu, Y.3
Xue, Z.4
-
109
-
-
84902184327
-
A high data rate wireless communication system with improved secrecy: Full duplex beamforming
-
Jun.
-
Ö. Cepheli, S. Tedik, and G. K. Kurt, "A high data rate wireless communication system with improved secrecy: Full duplex beamforming," IEEE Commun. Lett., vol. 18, no. 6, pp. 1075-1078, Jun. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.6
, pp. 1075-1078
-
-
Cepheli, Ö.1
Tedik, S.2
Kurt, G.K.3
-
110
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
Oct.
-
S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
111
-
-
84893411461
-
A general framework of wiretap channel with helping interference and state information
-
Feb.
-
P. Xu, Z. Ding, X. Dai, and K. K. Leung, "A general framework of wiretap channel with helping interference and state information," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 182-195, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.2
, pp. 182-195
-
-
Xu, P.1
Ding, Z.2
Dai, X.3
Leung, K.K.4
-
112
-
-
84878400311
-
Uncoordinated cooperative jamming for secret communications
-
Jul.
-
S. Luo, J. Li, and A. P. Petropulu, "Uncoordinated cooperative jamming for secret communications," IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1081-1090, Jul. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.7
, pp. 1081-1090
-
-
Luo, S.1
Li, J.2
Petropulu, A.P.3
-
113
-
-
84995684459
-
On secrecy performance of multiantenna-jammer-aided secure communications with imperfect CSI
-
Oct.
-
X. Chen, J. Chen, H. Zhang, Y. Zhang, and C. Yuen, "On secrecy performance of multiantenna-jammer-aided secure communications with imperfect CSI," IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8014-8024, Oct. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.10
, pp. 8014-8024
-
-
Chen, X.1
Chen, J.2
Zhang, H.3
Zhang, Y.4
Yuen, C.5
-
114
-
-
51649109883
-
On the secrecy capacity of fading wireless channel with multiple eavesdroppers
-
Nice, France, Jun.
-
P. Wang, G. Yu, and Z. Zhang, "On the secrecy capacity of fading wireless channel with multiple eavesdroppers," in Proc. IEEE ISIT, Nice, France, Jun. 2007, pp. 1301-1305.
-
(2007)
Proc. IEEE ISIT
, pp. 1301-1305
-
-
Wang, P.1
Yu, G.2
Zhang, Z.3
-
115
-
-
84901947419
-
Secure multipleinput single-output communication-Part II: δ-secrecy symbol error probability and secrecy diversity
-
May
-
T. V. Nguyen, Y. Jeong, J. S. Kwak, and H. Shin, "Secure multipleinput single-output communication-Part II: δ-secrecy symbol error probability and secrecy diversity," IET Commun., vol. 8, no. 8, pp. 1227-1238, May 2014.
-
(2014)
IET Commun.
, vol.8
, Issue.8
, pp. 1227-1238
-
-
Nguyen, T.V.1
Jeong, Y.2
Kwak, J.S.3
Shin, H.4
-
116
-
-
84962184376
-
Secrecy rate optimizations for a MISO secrecy channel with multiple multiantenna eavesdroppers
-
Jan.
-
Z. Chu, H. Xing, M. Johnston, and S. L. Goff, "Secrecy rate optimizations for a MISO secrecy channel with multiple multiantenna eavesdroppers," IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 283-297, Jan. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.1
, pp. 283-297
-
-
Chu, Z.1
Xing, H.2
Johnston, M.3
Goff, S.L.4
-
117
-
-
79951595646
-
QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
-
Mar.
-
W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1202-1216
-
-
Liao, W.-C.1
Chang, T.-H.2
Ma, W.-K.3
Chi, C.-Y.4
-
118
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep.
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
119
-
-
80855123713
-
Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
-
Oct.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3528-3540
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
120
-
-
80054058314
-
Optimal power allocation for secure multicarrier relay systems
-
Nov.
-
C. Jeong and I.-M. Kim, "Optimal power allocation for secure multicarrier relay systems," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.11
, pp. 5428-5442
-
-
Jeong, C.1
Kim, I.-M.2
-
121
-
-
84961839468
-
Multi-antenna relay aided wireless physical layer security
-
Dec.
-
X. Chen, C. Zhong, C. Yuen, and H.-H. Chen, "Multi-antenna relay aided wireless physical layer security," IEEE Commun. Mag., vol. 53, no. 12, pp. 40-46, Dec. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.12
, pp. 40-46
-
-
Chen, X.1
Zhong, C.2
Yuen, C.3
Chen, H.-H.4
-
122
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
123
-
-
84861163930
-
Capacity bounds for AF dual-hop relaying in G fading channel
-
May
-
C. Zhong, M. Matthaiou, G. Karagiannidis, A. Huang, and Z. Zhang, "Capacity bounds for AF dual-hop relaying in G fading channel," IEEE Trans. Veh. Technol., vol. 61, no. 4, pp. 1730-1740, May 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.4
, pp. 1730-1740
-
-
Zhong, C.1
Matthaiou, M.2
Karagiannidis, G.3
Huang, A.4
Zhang, Z.5
-
124
-
-
36248968306
-
Towards the optimal amplify-and-forward cooperative diversity scheme
-
Sep.
-
S. Yang and J.-C. Belfiore, "Towards the optimal amplify-and-forward cooperative diversity scheme," IEEE Trans. Inf. Theory, vol. 53, no. 9, pp. 3114-3126, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Theory
, vol.53
, Issue.9
, pp. 3114-3126
-
-
Yang, S.1
Belfiore, J.-C.2
-
125
-
-
68949180348
-
Recent advances in amplify-and-forward two-hop relaying
-
Jul.
-
S. Berger, M. Kuhn, A. Wittneben, T. Unger, and A. Klein, "Recent advances in amplify-and-forward two-hop relaying," IEEE Commun. Mag., vol. 47, no. 7, pp. 50-56, Jul. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.7
, pp. 50-56
-
-
Berger, S.1
Kuhn, M.2
Wittneben, A.3
Unger, T.4
Klein, A.5
-
126
-
-
34247619637
-
Highperformance cooperative demodulation with decode-and-forward relays
-
Jul.
-
T. Wang, A. Cano, G. B. Giannakis, and J. N. Laneman, "Highperformance cooperative demodulation with decode-and-forward relays," IEEE Trans. Commun., vol. 55, no. 7, pp. 1427-1438, Jul. 2007.
-
(2007)
IEEE Trans. Commun.
, vol.55
, Issue.7
, pp. 1427-1438
-
-
Wang, T.1
Cano, A.2
Giannakis, G.B.3
Laneman, J.N.4
-
127
-
-
34547730230
-
Channel estimation for amplify and forward relay based cooperation diversity systems
-
Jun.
-
C. S. Patel and G. L. Stuber, "Channel estimation for amplify and forward relay based cooperation diversity systems," IEEE Trans. Wireless Commun., vol. 6, no. 6, pp. 2348-2356, Jun. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.6
, pp. 2348-2356
-
-
Patel, C.S.1
Stuber, G.L.2
-
128
-
-
47149095276
-
Diversity order analysis of the decode-andforward cooperative networks with relay selection
-
May
-
Z. Yi and I.-M. Kim, "Diversity order analysis of the decode-andforward cooperative networks with relay selection," IEEE Trans. Wireless Commun., vol. 7, no. 5, pp. 1792-1799, May 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.5
, pp. 1792-1799
-
-
Yi, Z.1
Kim, I.-M.2
-
129
-
-
77951604986
-
Ergodic capacity analysis of amplify-and-forward MIMO dual-hop system
-
May
-
S. Jin, M. R. McKay, C. Zhong, and K.-K. Wong, "Ergodic capacity analysis of amplify-and-forward MIMO dual-hop system," IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2204-2224, May 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.5
, pp. 2204-2224
-
-
Jin, S.1
McKay, M.R.2
Zhong, C.3
Wong, K.-K.4
-
130
-
-
84904819613
-
Ergodic capacity comparison of different relay precoding schemes in dual-hop AF systems with co-channel interference
-
Jul.
-
G. Zhu et al., "Ergodic capacity comparison of different relay precoding schemes in dual-hop AF systems with co-channel interference," IEEE Trans. Commun., vol. 62, no. 7, pp. 2314-2328, Jul. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.7
, pp. 2314-2328
-
-
Zhu, G.1
-
131
-
-
84904282993
-
Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks
-
Aug.
-
H.-M. Wang, F. Liu, and X.-G. Xia, "Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240-1250, Aug. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.8
, pp. 1240-1250
-
-
Wang, H.-M.1
Liu, F.2
Xia, X.-G.3
-
132
-
-
84931060336
-
The achievable secrecy rate of multi-antenna AF relaying using joint transmit and receive beamforming
-
Sep.
-
M. Mirzaee and S. Akhlaghi, "The achievable secrecy rate of multi-antenna AF relaying using joint transmit and receive beamforming," in Proc. IST, Sep. 2014, pp. 1122-1127.
-
(2014)
Proc. IST
, pp. 1122-1127
-
-
Mirzaee, M.1
Akhlaghi, S.2
-
133
-
-
84879149313
-
Secure relay beamforming with imperfect channel side information
-
Jun.
-
X. Wang, K. Wang, and X.-D. Zhang, "Secure relay beamforming with imperfect channel side information," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2140-2155
-
-
Wang, X.1
Wang, K.2
Zhang, X.-D.3
-
134
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdropper
-
Jan.
-
Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdropper," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.-K.3
Ge, J.4
Ching, P.C.5
-
135
-
-
84865017592
-
Joint SVD-GSVD precoding technique and secrecy capacity lower bound for the MIMO relay wire-tap channel
-
Yokohama, Japan, May
-
M. Jilani and T. Ohtsuki, "Joint SVD-GSVD precoding technique and secrecy capacity lower bound for the MIMO relay wire-tap channel," in Proc. IEEE VTC Spring, Yokohama, Japan, May 2012, pp. 1-5.
-
(2012)
Proc. IEEE VTC Spring
, pp. 1-5
-
-
Jilani, M.1
Ohtsuki, T.2
-
136
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
Oct.
-
J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
137
-
-
84946607375
-
Large-scale MIMO relaying techniques for physical layer security: AF or DF?
-
Sep.
-
X. Chen, L. Lei, H. Zhang, and C. Yuen, "Large-scale MIMO relaying techniques for physical layer security: AF or DF?" IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5135-5146, Sep. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.9
, pp. 5135-5146
-
-
Chen, X.1
Lei, L.2
Zhang, H.3
Yuen, C.4
-
138
-
-
84862571591
-
Relay placement for physical layer security: A secure connection perspective
-
Jun.
-
J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.6
, pp. 878-881
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
-
139
-
-
84928642759
-
Secure compute-andforward in a bidirectional relay
-
May
-
S. Vatedka, N. Kashyap, and A. Thangaraj, "Secure compute-andforward in a bidirectional relay," IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2531-2556, May 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.5
, pp. 2531-2556
-
-
Vatedka, S.1
Kashyap, N.2
Thangaraj, A.3
-
140
-
-
84979766980
-
Modify-and-forward for securing cooperative relay communications
-
Zürich, Switzerland, Feb.
-
S. W. Kim, "Modify-and-forward for securing cooperative relay communications," in Proc. Int. Zurich Seminar Commun., Zürich, Switzerland, Feb. 2014, pp. 136-139.
-
(2014)
Proc. Int. Zurich Seminar Commun.
, pp. 136-139
-
-
Kim, S.W.1
-
141
-
-
80052889357
-
Cooperative jamming for secure communications in MIMO relay networks
-
Oct.
-
J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.10
, pp. 4871-4884
-
-
Huang, J.1
Swindlehurst, A.L.2
-
142
-
-
78650858776
-
On the secure degrees of freedom of relaying with half-duplex feedback
-
Jan.
-
T. T. Kim and H. V. Poor, "On the secure degrees of freedom of relaying with half-duplex feedback," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 291-302, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 291-302
-
-
Kim, T.T.1
Poor, H.V.2
-
143
-
-
84921657602
-
Secure beamforming based on sparsity in multiple amplify-and-forward MIMO relay networks
-
Hefei, China, Oct.
-
M. Zhao, S. Feng, Y. Liu, and X. Wang, "Secure beamforming based on sparsity in multiple amplify-and-forward MIMO relay networks," in Proc. IEEE WCSP, Hefei, China, Oct. 2014, pp. 1-6.
-
(2014)
Proc. IEEE WCSP
, pp. 1-6
-
-
Zhao, M.1
Feng, S.2
Liu, Y.3
Wang, X.4
-
144
-
-
84862963131
-
Joint relay and jammer selection for secure two-way relay networks
-
Feb.
-
J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 310-320
-
-
Chen, J.1
Zhang, R.2
Song, L.3
Han, Z.4
Jiao, B.5
-
145
-
-
84889603798
-
The role of feedback in two-way secure communications
-
Dec.
-
X. He and A. Yener, "The role of feedback in two-way secure communications," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8115-8130, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.12
, pp. 8115-8130
-
-
He, X.1
Yener, A.2
-
146
-
-
84912067811
-
Joint resource allocation in secure two-way relay networks with QoS guarantee and fairness
-
Istanbul, Turkey, Apr.
-
J. Zhao, W. Zheng, X. Wen, and L. Zhang, "Joint resource allocation in secure two-way relay networks with QoS guarantee and fairness," in Proc. IEEE WCNC, Istanbul, Turkey, Apr. 2014, pp. 1985-1989.
-
(2014)
Proc. IEEE WCNC
, pp. 1985-1989
-
-
Zhao, J.1
Zheng, W.2
Wen, X.3
Zhang, L.4
-
147
-
-
67650587787
-
Optimal beamforming for two-way multi-antenna relay channel with analogue network coding
-
Jun.
-
R. Zhang, Y.-C. Liang, C. C. Chai, and S. Cui, "Optimal beamforming for two-way multi-antenna relay channel with analogue network coding," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 699-712, Jun. 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.5
, pp. 699-712
-
-
Zhang, R.1
Liang, Y.-C.2
Chai, C.C.3
Cui, S.4
-
148
-
-
84881372976
-
Joint networkchannel coding with rateless code in two-way relay systems
-
Jul.
-
Y. Zhang, Z. Zhang, R. Yin, G. Yu, and W. Wang, "Joint networkchannel coding with rateless code in two-way relay systems," IEEE Trans. Wireless Commun., vol. 12, no. 7, pp. 3158-3169, Jul. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.7
, pp. 3158-3169
-
-
Zhang, Y.1
Zhang, Z.2
Yin, R.3
Yu, G.4
Wang, W.5
-
149
-
-
78650893906
-
Secure network coding on a wiretap network
-
Jan.
-
N. Cai and R. W. Yeung, "Secure network coding on a wiretap network," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 424-435, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 424-435
-
-
Cai, N.1
Yeung, R.W.2
-
150
-
-
84949921982
-
Beamforming for secure two-way relay networks with physical layer network coding
-
Austin, TX, USA, Dec.
-
C. Zhang, H. Gao, T. Lv, Y. Lu, and X. Su, "Beamforming for secure two-way relay networks with physical layer network coding," in Proc. IEEE GLOBECOM, Austin, TX, USA, Dec. 2014, pp. 1734-1739.
-
(2014)
Proc. IEEE GLOBECOM
, pp. 1734-1739
-
-
Zhang, C.1
Gao, H.2
Lv, T.3
Lu, Y.4
Su, X.5
-
151
-
-
84904303963
-
Secure beamforming design for physical layer network coding based MIMO two-way relaying
-
Jul.
-
K. Jayasinghe, P. Jayasinghe, N. Rajatheva, and M. Latva-Aho, "Secure beamforming design for physical layer network coding based MIMO two-way relaying," IEEE Commun. Lett., vol. 18, no. 7, pp. 1270-1273, Jul. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.7
, pp. 1270-1273
-
-
Jayasinghe, K.1
Jayasinghe, P.2
Rajatheva, N.3
Latva-Aho, M.4
-
152
-
-
78751521977
-
Securing multi-antenna twoway relay channels with analog network coding against eavesdroppers
-
Marrakesh, Morocco, Jun.
-
A. Mukherjee and A. L. Swindlehurst, "Securing multi-antenna twoway relay channels with analog network coding against eavesdroppers," in Proc. IEEE SPAWC, Marrakesh, Morocco, Jun. 2010, pp. 1-5.
-
(2010)
Proc. IEEE SPAWC
, pp. 1-5
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
153
-
-
84871761876
-
Full-duplex relay selection for amplify-and-forward cooperative networks
-
Dec.
-
I. Krikidis, H. A. Suraweera, P. J. Smith, and C. Yuen, "Full-duplex relay selection for amplify-and-forward cooperative networks," IEEE Trans. Wireless Commun., vol. 11, no. 12, pp. 4381-4393, Dec. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.12
, pp. 4381-4393
-
-
Krikidis, I.1
Suraweera, H.A.2
Smith, P.J.3
Yuen, C.4
-
154
-
-
84861187791
-
Dynamic resource allocation in MIMO-OFDMA systems with full-duplex and hybrid relaying
-
May
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Dynamic resource allocation in MIMO-OFDMA systems with full-duplex and hybrid relaying," IEEE Trans. Commun., vol. 60, no. 5, pp. 1291-1304, May 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.5
, pp. 1291-1304
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
155
-
-
84899653230
-
Grassmannian signalling achieves tight bounds on the ergodic high-SNR capacity of the noncoherent MIMO full-duplex relay channel
-
May
-
R. H. Gohary and H. Yanikomeroglu, "Grassmannian signalling achieves tight bounds on the ergodic high-SNR capacity of the noncoherent MIMO full-duplex relay channel," IEEE Trans. Inf. Theory, vol. 60, no. 5, pp. 2480-2494, May 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.5
, pp. 2480-2494
-
-
Gohary, R.H.1
Yanikomeroglu, H.2
-
156
-
-
84927708955
-
Full-duplex relay for enhancing physical layer security in multi-hop relaying systems
-
Apr.
-
J.-H. Lee, "Full-duplex relay for enhancing physical layer security in multi-hop relaying systems," IEEE Commun. Lett., vol. 19, no. 4, pp. 525-528, Apr. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.4
, pp. 525-528
-
-
Lee, J.-H.1
-
157
-
-
84922811042
-
Physical layer network security in the full-duplex relay system
-
Mar.
-
G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system," IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 574-583, Mar. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.3
, pp. 574-583
-
-
Chen, G.1
Gong, Y.2
Xiao, P.3
Chambers, J.A.4
-
158
-
-
84916918571
-
On the performance of secure full-duplex relaying under composite fading channels
-
Jul.
-
H. Alves, G. Brante, R. D. Souza, D. B. da Costa, and M. Latva-Aho, "On the performance of secure full-duplex relaying under composite fading channels," IEEE Signal Process. Lett., vol. 22, no. 7, pp. 867-870, Jul. 2015.
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.7
, pp. 867-870
-
-
Alves, H.1
Brante, G.2
Souza, R.D.3
Da Costa, D.B.4
Latva-Aho, M.5
-
159
-
-
70449476498
-
Secure diversitymultiplexing tradeoffs in MIMO relay channels
-
Seoul, South Korea, Jul.
-
K. T. Gowda, T. Q. S. Quek, and H. Shin, "Secure diversitymultiplexing tradeoffs in MIMO relay channels," in Proc. IEEE ISIT, Seoul, South Korea, Jul. 2009, pp. 1433-1437.
-
(2009)
Proc. IEEE ISIT
, pp. 1433-1437
-
-
Gowda, K.T.1
Quek, T.Q.S.2
Shin, H.3
-
160
-
-
85008537206
-
Secure communication in multiple relay networks through decode-and-forward strategies
-
Aug.
-
R. Bassily and S. Ulukus, "Secure communication in multiple relay networks through decode-and-forward strategies," J. Commun. Netw., vol. 14, no. 4, pp. 352-363, Aug. 2012.
-
(2012)
J. Commun. Netw.
, vol.14
, Issue.4
, pp. 352-363
-
-
Bassily, R.1
Ulukus, S.2
-
161
-
-
84944320504
-
Full-duplex relay with jamming protocol for improving physical-layer security
-
Washington, DC, USA, Sep.
-
S. Parsaeefard and T. Le-Ngoc, "Full-duplex relay with jamming protocol for improving physical-layer security," in Proc. IEEE PIMRC, Washington, DC, USA, Sep. 2014, pp. 129-133.
-
(2014)
Proc. IEEE PIMRC
, pp. 129-133
-
-
Parsaeefard, S.1
Le-Ngoc, T.2
-
162
-
-
84896908427
-
Max-ratio relay selection in secure buffer-aided cooperative wireless networks
-
Apr.
-
G. Chen, Z. Tian, Y. Gong, Z. Chen, and J. A. Chambers, "Max-ratio relay selection in secure buffer-aided cooperative wireless networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 719-729, Apr. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.4
, pp. 719-729
-
-
Chen, G.1
Tian, Z.2
Gong, Y.3
Chen, Z.4
Chambers, J.A.5
-
163
-
-
70350583050
-
Relay selection for secure cooperative networks with jamming
-
Oct.
-
I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.10
, pp. 5003-5011
-
-
Krikidis, I.1
Thompson, J.S.2
McLaughlin, S.3
-
164
-
-
84883052221
-
An effective secure transmission scheme for AF relay networks with two-hop information leakage
-
Aug.
-
M. Lin, J. Ge, and Y. Yang, "An effective secure transmission scheme for AF relay networks with two-hop information leakage," IEEE Commun. Lett., vol. 17, no. 8, pp. 1676-1679, Aug. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.8
, pp. 1676-1679
-
-
Lin, M.1
Ge, J.2
Yang, Y.3
-
165
-
-
84856271363
-
On the application of cooperative transmission to secrecy communications
-
Feb.
-
Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.2
, pp. 359-368
-
-
Ding, Z.1
Leung, K.K.2
Goeckel, D.L.3
Towsley, D.4
-
166
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
167
-
-
84904614329
-
Security versus reliability analysis of opportunistic relaying
-
Jul.
-
Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.6
, pp. 2653-2661
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
Hanzo, L.4
-
168
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
Mar.
-
G. Zheng, L.-C. Choo, and K.-K. Wang, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.-C.2
Wang, K.-K.3
-
169
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
170
-
-
84930198060
-
Opportunistic relay selection for secrecy enhancement in cooperative networks
-
May
-
F. S. Al-Qahtani, C. Zhong, and H. M. Alnuweiri, "Opportunistic relay selection for secrecy enhancement in cooperative networks," IEEE Trans. Commun., vol. 63, no. 5, pp. 1756-1770, May 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.5
, pp. 1756-1770
-
-
Al-Qahtani, F.S.1
Zhong, C.2
Alnuweiri, H.M.3
-
171
-
-
84946240351
-
Robust joint beamforming and jamming for secure AF networks: Low-complexity design
-
May
-
C. Wang and H.-M. Wang, "Robust joint beamforming and jamming for secure AF networks: Low-complexity design," IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.5
, pp. 2192-2198
-
-
Wang, C.1
Wang, H.-M.2
-
172
-
-
84917671161
-
Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks
-
Jan.
-
Q. Li et al., "Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks," IEEE Trans. Signal Process., vol. 63, no. 1, pp. 206-220, Jan. 2015.
-
(2015)
IEEE Trans. Signal Process.
, vol.63
, Issue.1
, pp. 206-220
-
-
Li, Q.1
-
173
-
-
84891354137
-
Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI
-
Budapest, Hungary, Jun.
-
S. Vishwakarma and A. Chockalingam, "Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI," in Proc. IEEE ICC, Budapest, Hungary, Jun. 2013, pp. 3047-3052.
-
(2013)
Proc. IEEE ICC
, pp. 3047-3052
-
-
Vishwakarma, S.1
Chockalingam, A.2
-
174
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
175
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug.
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.8
, pp. 3807-3827
-
-
He, X.1
Yener, A.2
-
176
-
-
84856969548
-
Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
-
Baltimore, MD, USA, Nov.
-
Q. Zhu, W. Saad, Z. Han, H. V. Poor, and T. Başar, "Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach," in Proc. MILCOM, Baltimore, MD, USA, Nov. 2011, pp. 119-124.
-
(2011)
Proc. MILCOM
, pp. 119-124
-
-
Zhu, Q.1
Saad, W.2
Han, Z.3
Poor, H.V.4
Başar, T.5
-
177
-
-
84924902824
-
Security-aware relaying scheme for cooperative networks with untrusted relay nodes
-
Mar.
-
L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, "Security-aware relaying scheme for cooperative networks with untrusted relay nodes," IEEE Commun. Lett., vol. 19, no. 3, pp. 463-466, Mar. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.3
, pp. 463-466
-
-
Sun, L.1
Ren, P.2
Du, Q.3
Wang, Y.4
Gao, Z.5
-
178
-
-
84985015755
-
Relay selection for secure successive AF relaying networks with untrusted nodes
-
Nov.
-
W. Wang, K. C. Teh, and K. H. Li, "Relay selection for secure successive AF relaying networks with untrusted nodes," IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2466-2476, Nov. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.11
, pp. 2466-2476
-
-
Wang, W.1
Teh, K.C.2
Li, K.H.3
-
179
-
-
84903317482
-
Secure transmission with optimal power allocation in untrusted relay networks
-
Jun.
-
L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure transmission with optimal power allocation in untrusted relay networks," IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
-
(2014)
IEEE Wireless Commun. Lett.
, vol.3
, Issue.3
, pp. 289-292
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
Tran, N.H.4
Duong, T.Q.5
-
180
-
-
84901257838
-
Joint transmit design and node selection for one-way and two-way untrusted relay channels
-
Pacific Grove, CA, USA, Nov.
-
J. Huang and A. L. Swindlehurst, "Joint transmit design and node selection for one-way and two-way untrusted relay channels," in Proc. Asilomar SSC, Pacific Grove, CA, USA, Nov. 2013, pp. 1555-1559.
-
(2013)
Proc. Asilomar SSC
, pp. 1555-1559
-
-
Huang, J.1
Swindlehurst, A.L.2
-
181
-
-
84898039745
-
Secure beamforming for MIMO two-way communications with an untrusted relay
-
May
-
J. Mo, M. Tao, Y. Liu, and R. Wang, "Secure beamforming for MIMO two-way communications with an untrusted relay," IEEE Trans. Signal Process., vol. 62, no. 9, pp. 2185-2199, May 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.9
, pp. 2185-2199
-
-
Mo, J.1
Tao, M.2
Liu, Y.3
Wang, R.4
-
182
-
-
84867799883
-
Physical layer security for two-way untrusted relaying with friendly jammers
-
Oct.
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.8
, pp. 3693-3704
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
-
183
-
-
85032751997
-
From single user to multiuser communications: Shifting the MIMO paradigm
-
Oct.
-
D. Gesbert, M. Kountouris, R. W. Heath, Jr., C. B. Chae, and T. Salzer, "From single user to multiuser communications: Shifting the MIMO paradigm," IEEE Signal Process. Mag., vol. 24, no. 5, pp. 36-46, Oct. 2007.
-
(2007)
IEEE Signal Process. Mag.
, vol.24
, Issue.5
, pp. 36-46
-
-
Gesbert, D.1
Kountouris, M.2
Heath, R.W.3
Chae, C.B.4
Salzer, T.5
-
184
-
-
70449567914
-
Multi-user MIMO systems: The future in the making
-
Nov./Dec.
-
K. Kurve, "Multi-user MIMO systems: The future in the making," IEEE Potentials, vol. 28, no. 6, pp. 37-42, Nov./Dec. 2009.
-
(2009)
IEEE Potentials
, vol.28
, Issue.6
, pp. 37-42
-
-
Kurve, K.1
-
185
-
-
84857368789
-
Adaptive mode selection for multiuser MIMO downlink employing rateless codes with QoS provisioning
-
Feb.
-
X. Chen, Z. Zhang, S. Chen, and C. Wang, "Adaptive mode selection for multiuser MIMO downlink employing rateless codes with QoS provisioning," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 790-799, Feb. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.11
, Issue.2
, pp. 790-799
-
-
Chen, X.1
Zhang, Z.2
Chen, S.3
Wang, C.4
-
186
-
-
45249092485
-
Secure broadcasting over fading channels
-
Jun.
-
A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2453-2469
-
-
Khisti, A.1
Tchamkerten, A.2
Wornell, G.W.3
-
187
-
-
80051774471
-
Secure type-based multiple access
-
Sep.
-
H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, "Secure type-based multiple access," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 763-774, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 763-774
-
-
Jeon, H.1
Hwang, D.2
Choi, J.3
Lee, H.4
Ha, J.5
-
188
-
-
84907525208
-
Secure multiuser communications in multiple amplify-and-forward relay networks
-
Sep.
-
L. Fan, X. Lei, T. Q. Duong, M. Elkashlan, and G. K. Karagiannidis, "Secure multiuser communications in multiple amplify-and-forward relay networks," IEEE Trans. Commun., vol. 62, no. 9, pp. 3299-3310, Sep. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.62
, Issue.9
, pp. 3299-3310
-
-
Fan, L.1
Lei, X.2
Duong, T.Q.3
Elkashlan, M.4
Karagiannidis, G.K.5
-
189
-
-
77958520866
-
Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages
-
Nov.
-
H. D. Ly, T. Liu, and Y. Liang, "Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5477-5487, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5477-5487
-
-
Ly, H.D.1
Liu, T.2
Liang, Y.3
-
190
-
-
78649315054
-
Secure broadcasting using multiple antennas
-
Oct.
-
E. Ekrem and S. Ulukus, "Secure broadcasting using multiple antennas," J. Commun. Netw., vol. 12, no. 5, pp. 411-432, Oct. 2010.
-
(2010)
J. Commun. Netw.
, vol.12
, Issue.5
, pp. 411-432
-
-
Ekrem, E.1
Ulukus, S.2
-
191
-
-
79955497445
-
Interference alignment for the multiantenna compound wiretap channel
-
May
-
A. Khisti, "Interference alignment for the multiantenna compound wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2976-2993, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2976-2993
-
-
Khisti, A.1
-
192
-
-
77949575243
-
Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
-
Monticello, IL, USA, Sep./Oct.
-
A. Mukherjee and A. L. Swindlehurst, "Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels," in Proc. Allerton CCC, Monticello, IL, USA, Sep./Oct. 2009, pp. 1134-1141.
-
(2009)
Proc. Allerton CCC
, pp. 1134-1141
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
193
-
-
85027407300
-
Mode selection in MU-MIMO downlink networks: A physical-layer security perspective
-
to be published
-
X. Chen and Y. Zhang, "Mode selection in MU-MIMO downlink networks: A physical-layer security perspective," IEEE Syst. J., to be published, doi: 10.1109/JSYST.2015.2413843.
-
IEEE Syst. J.
-
-
Chen, X.1
Zhang, Y.2
-
194
-
-
84880150823
-
Large system analysis of linear precoding in MISO broadcast channels with confidential messages
-
Sep.
-
G. Geraci, R. Couillet, J. Yuan, M. Debbah, and I. B. Collings, "Large system analysis of linear precoding in MISO broadcast channels with confidential messages," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1660-1671, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1660-1671
-
-
Geraci, G.1
Couillet, R.2
Yuan, J.3
Debbah, M.4
Collings, I.B.5
-
195
-
-
84907220339
-
Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis
-
Sep.
-
J. Zhang, C. Yuen, C.-K. Wen, S. Jin, and X. Gao, "Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis," IEEE Commun. Lett., vol. 18, no. 9, pp. 1627-1630, Sep. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.9
, pp. 1627-1630
-
-
Zhang, J.1
Yuen, C.2
Wen, C.-K.3
Jin, S.4
Gao, X.5
-
196
-
-
84910151930
-
Physical layer security in multi-cell MISO downlinks with incomplete CSI-A unified secrecy performance analysis
-
Dec.
-
X. Chen and H.-H. Chen, "Physical layer security in multi-cell MISO downlinks with incomplete CSI-A unified secrecy performance analysis," IEEE Trans. Signal Process., vol. 62, no. 23, pp. 6286-6297, Dec. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.23
, pp. 6286-6297
-
-
Chen, X.1
Chen, H.-H.2
-
197
-
-
80855138617
-
Capacity analysis of a multi-cell multi-antenna cooperative cellular network with co-channel interference
-
Oct.
-
X. Ge, K. Huang, C.-X. Wang, X. Hong, and X. Yang, "Capacity analysis of a multi-cell multi-antenna cooperative cellular network with co-channel interference," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3298-3309, Oct. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.10
, pp. 3298-3309
-
-
Ge, X.1
Huang, K.2
Wang, C.-X.3
Hong, X.4
Yang, X.5
-
198
-
-
33750058305
-
Downlink beamforming algorithms with inter-cell interference in cellular networks
-
Oct.
-
T. Ren and R. J. La, "Downlink beamforming algorithms with inter-cell interference in cellular networks," IEEE Trans. Wireless Commun., vol. 5, no. 10, pp. 2814-2823, Oct. 2006.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, Issue.10
, pp. 2814-2823
-
-
Ren, T.1
La, R.J.2
-
199
-
-
78649738324
-
Multi-cell MIMO cooperative networks: A new look at interference
-
Dec.
-
D. Gesbert et al., "Multi-cell MIMO cooperative networks: A new look at interference," IEEE J. Sel. Areas Commun., vol. 28, no. 9, pp. 1380-1408, Dec. 2010.
-
(2010)
IEEE J. Sel. Areas Commun.
, vol.28
, Issue.9
, pp. 1380-1408
-
-
Gesbert, D.1
-
200
-
-
65949119326
-
Networked MIMO with clustered linear precoding
-
Apr.
-
J. Zhang, R. Chen, J. G. Andrews, A. Ghosh, and R. W. Heath, "Networked MIMO with clustered linear precoding," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 1910-1921, Apr. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 1910-1921
-
-
Zhang, J.1
Chen, R.2
Andrews, J.G.3
Ghosh, A.4
Heath, R.W.5
-
201
-
-
84907195591
-
Secure transmission in multicell massive MIMO systems
-
Sep.
-
J. Zhu, R. Schober, and V. K. Bhargava, "Secure transmission in multicell massive MIMO systems," IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4766-4781, Sep. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.9
, pp. 4766-4781
-
-
Zhu, J.1
Schober, R.2
Bhargava, V.K.3
-
202
-
-
84963567995
-
Linear precoding of data and artificial noise in secure massive MIMO systems
-
Mar.
-
J. Zhu, R. Schober, and V. K. Bhargava, "Linear precoding of data and artificial noise in secure massive MIMO systems," IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2245-2261, Mar. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.3
, pp. 2245-2261
-
-
Zhu, J.1
Schober, R.2
Bhargava, V.K.3
-
203
-
-
84969998525
-
Secure massive MIMO transmission with an active eavesdropper
-
Jul.
-
Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, "Secure massive MIMO transmission with an active eavesdropper," IEEE Trans. Inf. Theory, vol. 62, no. 7, pp. 3880-3900, Jul. 2016.
-
(2016)
IEEE Trans. Inf. Theory
, vol.62
, Issue.7
, pp. 3880-3900
-
-
Wu, Y.1
Schober, R.2
Ng, D.W.K.3
Xiao, C.4
Caire, G.5
-
204
-
-
80054827541
-
The secrecy capacity region of a special class of multiple access channels
-
St. Petersburg, Russia, Jul./Aug.
-
N. Liu and W. Kang, "The secrecy capacity region of a special class of multiple access channels," in Proc. IEEE ISIT, St. Petersburg, Russia, Jul./Aug. 2011, pp. 623-627.
-
(2011)
Proc. IEEE ISIT
, pp. 623-627
-
-
Liu, N.1
Kang, W.2
-
205
-
-
84921471912
-
On secure communication over multiple access wiretap channels under channel uncertainty
-
San Francisco, CA, USA, Oct.
-
R. F. Schaefer and H. V. Poor, "On secure communication over multiple access wiretap channels under channel uncertainty," in Proc. IEEE CNS, San Francisco, CA, USA, Oct. 2014, pp. 109-114.
-
(2014)
Proc. IEEE CNS
, pp. 109-114
-
-
Schaefer, R.F.1
Poor, H.V.2
-
206
-
-
84890353615
-
Secure degrees of freedom of the Gaussian multiple access wiretap channel
-
Istanbul, Turkey, Jul.
-
J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian multiple access wiretap channel," in Proc. IEEE ISIT, Istanbul, Turkey, Jul. 2013, pp. 1337-1341.
-
(2013)
Proc. IEEE ISIT
, pp. 1337-1341
-
-
Xie, J.1
Ulukus, S.2
-
207
-
-
84897894009
-
Performance analysis and optimization for interference alignment over MIMO interference channels with limited feedback
-
Apr.
-
X. Chen and C. Yuen, "Performance analysis and optimization for interference alignment over MIMO interference channels with limited feedback," IEEE Trans. Signal Process., vol. 62, no. 7, pp. 1785-1795, Apr. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.7
, pp. 1785-1795
-
-
Chen, X.1
Yuen, C.2
-
208
-
-
79955506113
-
Feasibility condition for interference alignment with diversity
-
May
-
H. Ning, C. Ling, and K. K. Leung, "Feasibility condition for interference alignment with diversity," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2902-2912, May 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.5
, pp. 2902-2912
-
-
Ning, H.1
Ling, C.2
Leung, K.K.3
-
209
-
-
79957667257
-
Interference alignment for secrecy
-
Jun.
-
O. O. Koyluoglu, H. E. Gamal, L. Lai, and H. V. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323-3332, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
Gamal, H.E.2
Lai, L.3
Poor, H.V.4
-
210
-
-
84928563686
-
Secure degrees of freedom of K-user Gaussian interference channels: A unified view
-
May
-
J. Xie and S. Ulukus, "Secure degrees of freedom of K-user Gaussian interference channels: A unified view," IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2647-2661, May 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.5
, pp. 2647-2661
-
-
Xie, J.1
Ulukus, S.2
-
211
-
-
84875720845
-
The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise
-
Monticello, IL, USA, Oct.
-
X. He and A. Yener, "The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise," in Proc. Allerton Conf., Monticello, IL, USA, Oct. 2012, pp. 204-211.
-
(2012)
Proc. Allerton Conf.
, pp. 204-211
-
-
He, X.1
Yener, A.2
-
212
-
-
84883278751
-
Robust coordinated beamforming for secure MISO interference channels with bounded ellipsoidal uncertainties
-
Aug.
-
J. Ni et al., "Robust coordinated beamforming for secure MISO interference channels with bounded ellipsoidal uncertainties," IEEE Wireless Commun. Lett., vol. 2, no. 4, pp. 407-410, Aug. 2013.
-
(2013)
IEEE Wireless Commun. Lett.
, vol.2
, Issue.4
, pp. 407-410
-
-
Ni, J.1
-
213
-
-
13844296408
-
Cognitive radio: Brain-empowered wireless communications
-
Feb.
-
S. Haykin, "Cognitive radio: Brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005.
-
(2005)
IEEE J. Sel. Areas Commun.
, vol.23
, Issue.2
, pp. 201-220
-
-
Haykin, S.1
-
214
-
-
85032751060
-
A Survey of dynamic spectrum access
-
May
-
Q. Zhao and B. M. Sadler, "A Survey of dynamic spectrum access," IEEE Signal Process. Mag., vol. 24, no. 3, pp. 79-89, May 2007.
-
(2007)
IEEE Signal Process. Mag.
, vol.24
, Issue.3
, pp. 79-89
-
-
Zhao, Q.1
Sadler, B.M.2
-
215
-
-
84906782754
-
Cooperative communications for cognitive radio networks-From theory to application
-
3rd Quart.
-
X. Chen, H.-H. Chen, and W. Meng, "Cooperative communications for cognitive radio networks-From theory to application," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1180-1193, 3rd Quart., 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1180-1193
-
-
Chen, X.1
Chen, H.-H.2
Meng, W.3
-
216
-
-
84865388936
-
Toward secure cognitive communications in wireless networks
-
Aug.
-
T. Jiang, T. Li, and J. Ren, "Toward secure cognitive communications in wireless networks," IEEE Wireless Commun., vol. 19, no. 4, pp. 82-88, Aug. 2012.
-
(2012)
IEEE Wireless Commun.
, vol.19
, Issue.4
, pp. 82-88
-
-
Jiang, T.1
Li, T.2
Ren, J.3
-
217
-
-
84976477515
-
Robust beamforming and power splitting for secrecy wireless information and power transfer in cognitive relay networks
-
Jun.
-
Y. Wu and X. Chen, "Robust beamforming and power splitting for secrecy wireless information and power transfer in cognitive relay networks," IEEE Commun. Lett., vol. 20, no. 6, pp. 1152-1155, Jun. 2016.
-
(2016)
IEEE Commun. Lett.
, vol.20
, Issue.6
, pp. 1152-1155
-
-
Wu, Y.1
Chen, X.2
-
218
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec.
-
Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
219
-
-
84928124775
-
A survey of security issues in cognitive radio networks
-
Mar.
-
J. Li, Z. Feng, Z. Feng, and P. Zhang, "A survey of security issues in cognitive radio networks," China Commun., vol. 12, no. 3, pp. 132-150, Mar. 2015.
-
(2015)
China Commun.
, vol.12
, Issue.3
, pp. 132-150
-
-
Li, J.1
Feng, Z.2
Feng, Z.3
Zhang, P.4
-
220
-
-
84873711287
-
A survey on security threats and detection techniques in cognitive radio networks
-
1st Quart.
-
A. G. Fragkiadakis, E. Z. Tragos, and I. G. Askoxylakis, "A survey on security threats and detection techniques in cognitive radio networks," IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 428-445, 1st Quart., 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 428-445
-
-
Fragkiadakis, A.G.1
Tragos, E.Z.2
Askoxylakis, I.G.3
-
221
-
-
84879072350
-
On physical layer security for cognitive radio networks
-
May/Jun.
-
Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Netw., vol. 27, no. 3, pp. 28-33, May/Jun. 2013.
-
(2013)
IEEE Netw.
, vol.27
, Issue.3
, pp. 28-33
-
-
Shu, Z.1
Qian, Y.2
Ci, S.3
-
222
-
-
84949921990
-
Secure degrees of freedom in MIMO cognitive radio systems
-
Austin, TX, USA, Dec.
-
H. Mu and J. K. Tugnait, "Secure degrees of freedom in MIMO cognitive radio systems," in Proc. IEEE GLOBECOM, Austin, TX, USA, Dec. 2014, pp. 1011-1016.
-
(2014)
Proc. IEEE GLOBECOM
, pp. 1011-1016
-
-
Mu, H.1
Tugnait, J.K.2
-
223
-
-
84890056190
-
Physical layer security in cognitive radio networks: A beamforming approach
-
Batumi, Georgia, Jul.
-
O. Cepheli and G. K. Kurt, "Physical layer security in cognitive radio networks: A beamforming approach," in Proc. BlackSeaCom, Batumi, Georgia, Jul. 2013, pp. 233-237.
-
(2013)
Proc. BlackSeaCom
, pp. 233-237
-
-
Cepheli, O.1
Kurt, G.K.2
-
224
-
-
84877644812
-
Secure MISO cognitive radio system with perfect and imperfect CSI
-
Anaheim, CA, USA, Dec.
-
T. Kwon, V. W. S. Wong, and R. Schober, "Secure MISO cognitive radio system with perfect and imperfect CSI," in Proc. IEEE GLOBECOM, Anaheim, CA, USA, Dec. 2012, pp. 1236-1241.
-
(2012)
Proc. IEEE GLOBECOM
, pp. 1236-1241
-
-
Kwon, T.1
Wong, V.W.S.2
Schober, R.3
-
225
-
-
77952860702
-
Achieving cognitive and secure transmissions using multiple antennas
-
Tokyo, Japan, Sep.
-
Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Achieving cognitive and secure transmissions using multiple antennas," in Proc. IEEE PIMRC, Tokyo, Japan, Sep. 2009, pp. 1-5.
-
(2009)
Proc. IEEE PIMRC
, pp. 1-5
-
-
Pei, Y.1
Liang, Y.-C.2
Zhang, L.3
Teh, K.C.4
Li, K.H.5
-
226
-
-
77951274829
-
Secure communication over MISO cognitive radio channels
-
Apr.
-
Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.4
, pp. 1494-1502
-
-
Pei, Y.1
Liang, Y.-C.2
Zhang, L.3
Teh, K.C.4
Li, K.H.5
-
227
-
-
79952680469
-
Secure communication in multiantenna cognitive radio networks with imperfect channel state information
-
Apr.
-
Y. Pei, Y.-C. Liang, K. C. Teh, and K. H. Li, "Secure communication in multiantenna cognitive radio networks with imperfect channel state information," IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1683-1693, Apr. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.4
, pp. 1683-1693
-
-
Pei, Y.1
Liang, Y.-C.2
Teh, K.C.3
Li, K.H.4
-
228
-
-
84969940810
-
Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer
-
May
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer," IEEE Trans. Veh. Technol., vol. 65, no. 5, pp. 3166-3184, May 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.5
, pp. 3166-3184
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
229
-
-
84939506188
-
On the security of cognitive radio networks
-
Aug.
-
M. Elkashlan, L. Wang, T. Q. Duong, G. K. Karagiannidis, and A. Nallanathan, "On the security of cognitive radio networks," IEEE Trans. Veh. Technol., vol. 64, no. 8, pp. 3790-3795, Aug. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.8
, pp. 3790-3795
-
-
Elkashlan, M.1
Wang, L.2
Duong, T.Q.3
Karagiannidis, G.K.4
Nallanathan, A.5
-
230
-
-
84973402072
-
Energy efficient beamforming for secure communication in cognitive radio networks
-
Shanghai, China, Mar.
-
J. Ouyang, M. Lin, W.-P. Zhu, D. Massicotte, and A. L. Swindlehurst, "Energy efficient beamforming for secure communication in cognitive radio networks," in Proc. IEEE ICASSP, Shanghai, China, Mar. 2016, pp. 3496-3500.
-
(2016)
Proc. IEEE ICASSP
, pp. 3496-3500
-
-
Ouyang, J.1
Lin, M.2
Zhu, W.-P.3
Massicotte, D.4
Swindlehurst, A.L.5
-
231
-
-
84886699027
-
Security-oriented transmission based on cooperative relays in cognitive radio
-
Aug.
-
W. Li, M. Xin, M. Yue, T. Yinglei, and Z. Yong, "Security-oriented transmission based on cooperative relays in cognitive radio," China Commun., vol. 10, no. 8, pp. 27-35, Aug. 2013.
-
(2013)
China Commun.
, vol.10
, Issue.8
, pp. 27-35
-
-
Li, W.1
Xin, M.2
Yue, M.3
Yinglei, T.4
Yong, Z.5
-
232
-
-
84923867468
-
Relay selection for security enhancement in cognitive relay networks
-
Feb.
-
Y. Liu, L. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, "Relay selection for security enhancement in cognitive relay networks," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 46-49, Feb. 2015.
-
(2015)
IEEE Wireless Commun. Lett.
, vol.4
, Issue.1
, pp. 46-49
-
-
Liu, Y.1
Wang, L.2
Duy, T.T.3
Elkashlan, M.4
Duong, T.Q.5
-
233
-
-
84921348505
-
Relay-selection improves the security-reliability trade-off in cognitive radio systems
-
Jan.
-
Y. Zou, B. Champagne, W.-P. Zhu, and L. Hanzo, "Relay-selection improves the security-reliability trade-off in cognitive radio systems," IEEE Trans. Commun., vol. 63, no. 1, pp. 215-228, Jan. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.1
, pp. 215-228
-
-
Zou, Y.1
Champagne, B.2
Zhu, W.-P.3
Hanzo, L.4
-
234
-
-
84878659299
-
MIMO broadcasting for simultaneous wireless information and power transfer
-
May
-
R. Zhang and C. K. Ho, "MIMO broadcasting for simultaneous wireless information and power transfer," IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 1989-2001, May 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.5
, pp. 1989-2001
-
-
Zhang, R.1
Ho, C.K.2
-
235
-
-
84888093326
-
Simultaneous information and power transfer for broadband wireless systems
-
Dec.
-
K. Huang and E. Larsson, "Simultaneous information and power transfer for broadband wireless systems," IEEE Trans. Signal Process., vol. 61, no. 23, pp. 5972-5986, Dec. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.23
, pp. 5972-5986
-
-
Huang, K.1
Larsson, E.2
-
236
-
-
84893341917
-
Wireless energy and information transfer tradeoff for limited-feedback multiantenna systems with energy beamforming
-
Jan.
-
X. Chen, C. Yuen, and Z. Zhang, "Wireless energy and information transfer tradeoff for limited-feedback multiantenna systems with energy beamforming," IEEE Trans. Veh. Technol., vol. 63, no. 1, pp. 407-412, Jan. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.1
, pp. 407-412
-
-
Chen, X.1
Yuen, C.2
Zhang, Z.3
-
237
-
-
84891558256
-
Wireless information and power transfer: Energy efficiency optimization in OFDMA systems
-
Dec.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Wireless information and power transfer: Energy efficiency optimization in OFDMA systems," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6352-6370, Dec. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.12
, pp. 6352-6370
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
238
-
-
84927658290
-
Wireless networks with RF energy harvesting: A contemporary survey
-
2nd Quart.
-
X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, "Wireless networks with RF energy harvesting: A contemporary survey," IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 757-789, 2nd Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.2
, pp. 757-789
-
-
Lu, X.1
Wang, P.2
Niyato, D.3
Kim, D.I.4
Han, Z.5
-
239
-
-
84927636500
-
Wireless powered communication: Opportunities and challenges
-
Apr.
-
S. Bi, C. K. Ho, and R. Zhang, "Wireless powered communication: Opportunities and challenges," IEEE Commun. Mag., vol. 53, no. 4, pp. 117-125, Apr. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.4
, pp. 117-125
-
-
Bi, S.1
Ho, C.K.2
Zhang, R.3
-
240
-
-
84968867653
-
Secrecy wireless information and power transfer: Challenges and opportunities
-
Apr.
-
X. Chen, D. W. K. Ng, and H.-H. Chen, "Secrecy wireless information and power transfer: Challenges and opportunities," IEEE Wireless Commun., vol. 23, no. 2, pp. 54-61, Apr. 2016.
-
(2016)
IEEE Wireless Commun.
, vol.23
, Issue.2
, pp. 54-61
-
-
Chen, X.1
Ng, D.W.K.2
Chen, H.-H.3
-
241
-
-
85013176736
-
Robust resource allocation for secrecy wireless powered communication networks
-
to be published
-
Y. Wu, X. Chen, C. Yuen, and C. Zhong, "Robust resource allocation for secrecy wireless powered communication networks," IEEE Commun. Lett., to be published, doi: 10.1109/LCOMM.2016.2598327.
-
IEEE Commun. Lett.
-
-
Wu, Y.1
Chen, X.2
Yuen, C.3
Zhong, C.4
-
242
-
-
84988584736
-
Secrecy performance of wirelessly powered wiretap channels
-
Sep.
-
X. Jiang et al., "Secrecy performance of wirelessly powered wiretap channels," IEEE Trans. Commun., vol. 64, no. 9, pp. 3858-3871, Sep. 2016.
-
(2016)
IEEE Trans. Commun.
, vol.64
, Issue.9
, pp. 3858-3871
-
-
Jiang, X.1
-
243
-
-
84927617729
-
Enhancing wireless information and power transfer by exploiting multi-antenna techniques
-
Apr.
-
X. Chen, Z. Zhang, H.-H. Chen, and H. Zhang, "Enhancing wireless information and power transfer by exploiting multi-antenna techniques," IEEE Commun. Mag., vol. 53, no. 4, pp. 133-141, Apr. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.4
, pp. 133-141
-
-
Chen, X.1
Zhang, Z.2
Chen, H.-H.3
Zhang, H.4
-
244
-
-
84927596040
-
Application of smart antenna technologies in simultaneous wireless information and power transfer
-
Apr.
-
Z. Ding et al., "Application of smart antenna technologies in simultaneous wireless information and power transfer," IEEE Commun. Mag., vol. 53, no. 4, pp. 86-93, Apr. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.4
, pp. 86-93
-
-
Ding, Z.1
-
245
-
-
84903595688
-
Robust beamforming for secure communication in systems with wireless information and power transfer
-
Aug.
-
D. W. K. Ng, E. S. Lo, and R. Schober, "Robust beamforming for secure communication in systems with wireless information and power transfer," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599-4615, Aug. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.8
, pp. 4599-4615
-
-
Ng, D.W.K.1
Lo, E.S.2
Schober, R.3
-
246
-
-
84947815873
-
Achievable ergodic secrecy rate for MIMO SWIPT wiretap channels
-
London, U.K., Jun.
-
J. Zhang et al., "Achievable ergodic secrecy rate for MIMO SWIPT wiretap channels," in Proc. IEEE ICC, London, U.K., Jun. 2015, pp. 453-458.
-
(2015)
Proc. IEEE ICC
, pp. 453-458
-
-
Zhang, J.1
-
247
-
-
84941722281
-
Secure and green SWIPT in distributed antenna networks with limited backhaul capacity
-
Sep.
-
D. W. K. Ng and R. Schober, "Secure and green SWIPT in distributed antenna networks with limited backhaul capacity," IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5082-5097, Sep. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.9
, pp. 5082-5097
-
-
Ng, D.W.K.1
Schober, R.2
-
248
-
-
84929378752
-
Secure beamforming for MIMO broadcasting with wireless information and power transfer
-
May
-
Q. Shi, W. Xu, J. Wu, E. Song, and Y, Wang, "Secure beamforming for MIMO broadcasting with wireless information and power transfer," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2841-2853, May 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.5
, pp. 2841-2853
-
-
Shi, Q.1
Xu, W.2
Wu, J.3
Song, E.4
Wang, Y.5
-
249
-
-
84921407537
-
Robust secure transmission in MISO simultaneous wireless information and power transfer system
-
Jan.
-
R. Feng, Q. Li, Q. Zhang, and J. Qin, "Robust secure transmission in MISO simultaneous wireless information and power transfer system," IEEE Trans. Veh. Technol., vol. 64, no. 1, pp. 400-405, Jan. 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.1
, pp. 400-405
-
-
Feng, R.1
Li, Q.2
Zhang, Q.3
Qin, J.4
-
250
-
-
84912101765
-
Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer
-
Jun.
-
M. Tian, X. Huang, Q. Zhang, and J. Qin, "Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer," IEEE Signal Process. Lett., vol. 22, no. 6, pp. 723-727, Jun. 2015.
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.6
, pp. 723-727
-
-
Tian, M.1
Huang, X.2
Zhang, Q.3
Qin, J.4
-
251
-
-
84897823215
-
Secrecy wireless information and power transfer with MISO beamforming
-
Apr.
-
L. Liu, R. Zhang, and K.-C. Chua, "Secrecy wireless information and power transfer with MISO beamforming," IEEE Trans. Signal Process., vol. 62, no. 7, pp. 1850-1863, Apr. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.7
, pp. 1850-1863
-
-
Liu, L.1
Zhang, R.2
Chua, K.-C.3
-
252
-
-
84925257868
-
Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels
-
Mar.
-
Q. Zhang, X. Huang, Q. Li, and J. Qin, "Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels," IEEE Trans. Commun., vol. 63, no. 3, pp. 906-915, Mar. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.3
, pp. 906-915
-
-
Zhang, Q.1
Huang, X.2
Li, Q.3
Qin, J.4
-
253
-
-
84902959511
-
Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks
-
Jun.
-
Q. Li, Q. Zhang, and J. Qin, "Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks," IEEE Trans. Veh. Technol., vol. 63, no. 5, pp. 2462-2467, Jun. 2014.
-
(2014)
IEEE Trans. Veh. Technol.
, vol.63
, Issue.5
, pp. 2462-2467
-
-
Li, Q.1
Zhang, Q.2
Qin, J.3
-
254
-
-
85009131916
-
Secure transmission in wireless powered massive MIMO relaying systems: Performance analysis and optimization
-
Oct.
-
X. Chen, J. Chen, and T. Liu, "Secure transmission in wireless powered massive MIMO relaying systems: Performance analysis and optimization," IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8025-8035, Oct. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.10
, pp. 8025-8035
-
-
Chen, X.1
Chen, J.2
Liu, T.3
-
255
-
-
84975755413
-
Energy-efficient power allocation for secure communications in wireless powered massive MIMO relaying systems
-
Nanjing, China, Oct.
-
C. Du, X. Chen, and L. Lei, "Energy-efficient power allocation for secure communications in wireless powered massive MIMO relaying systems," in Proc. WCSP, Nanjing, China, Oct. 2015, pp. 1-6.
-
(2015)
Proc. WCSP
, pp. 1-6
-
-
Du, C.1
Chen, X.2
Lei, L.3
-
256
-
-
72949120015
-
Deviceto-device communication as an underlay to LTE-advanced networks
-
Dec.
-
K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, "Deviceto-device communication as an underlay to LTE-advanced networks," IEEE Commun. Mag., vol. 47, no. 12, pp. 42-49, Dec. 2009.
-
(2009)
IEEE Commun. Mag.
, vol.47
, Issue.12
, pp. 42-49
-
-
Doppler, K.1
Rinne, M.2
Wijting, C.3
Ribeiro, C.B.4
Hugl, K.5
-
257
-
-
84964802947
-
Joint spectrum and power allocation for D2D communications underlaying cellular networks
-
Apr.
-
R. Yin et al., "Joint spectrum and power allocation for D2D communications underlaying cellular networks," IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2182-2195, Apr. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.4
, pp. 2182-2195
-
-
Yin, R.1
-
258
-
-
84903143070
-
Cooperative interference cancellation using device-to-device communications
-
Jun.
-
R. Tanbourgi, H. Jäkel, and F. K. Jondral, "Cooperative interference cancellation using device-to-device communications," IEEE Commun. Mag., vol. 52, no. 6, pp. 118-124, Jun. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.6
, pp. 118-124
-
-
Tanbourgi, R.1
Jäkel, H.2
Jondral, F.K.3
-
259
-
-
84924867341
-
Pricing-based interference coordination for D2D communications in cellular networks
-
Mar.
-
R. Yin, G. Yu, H. Zhang, Z. Zhang, and G. Y. Li, "Pricing-based interference coordination for D2D communications in cellular networks," IEEE Trans. Wireless Commun., vol. 14, no. 3, pp. 1519-1532, Mar. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.3
, pp. 1519-1532
-
-
Yin, R.1
Yu, G.2
Zhang, H.3
Zhang, Z.4
Li, G.Y.5
-
260
-
-
84900387940
-
Secure device-to-device communication in LTE-A
-
Apr.
-
M. Alam, D. Yang, J. Rodriguez, and R. A. Abd-Alhameed, "Secure device-to-device communication in LTE-A," IEEE Commun. Mag., vol. 52, no. 4, pp. 66-73, Apr. 2014.
-
(2014)
IEEE Commun. Mag.
, vol.52
, Issue.4
, pp. 66-73
-
-
Alam, M.1
Yang, D.2
Rodriguez, J.3
Abd-Alhameed, R.A.4
-
261
-
-
84929441108
-
Secure communications with D2D cooperation
-
Sharjah, UAE, Feb.
-
S. A. M. Ghanem and M. Ara, "Secure communications with D2D cooperation," in Proc. IEEE ICCSPA, Sharjah, UAE, Feb. 2015, pp. 1-6.
-
(2015)
Proc. IEEE ICCSPA
, pp. 1-6
-
-
Ghanem, S.A.M.1
Ara, M.2
-
262
-
-
85013032134
-
Secrecy-optimized resource allocation for device-to-device communication underlaying heterogeneous networks
-
to be published
-
K. Zhang, M. Peng, P. Zhang, and X. Li, "Secrecy-optimized resource allocation for device-to-device communication underlaying heterogeneous networks," IEEE Trans. Veh. Technol., to be published, doi: 10.1109/TVT.2016.2566298.
-
IEEE Trans. Veh. Technol.
-
-
Zhang, K.1
Peng, M.2
Zhang, P.3
Li, X.4
-
263
-
-
84890430700
-
Secrecy-based access control for device-to-device communication underlaying cellular networks
-
Nov.
-
J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks," IEEE Commun. Lett., vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.11
, pp. 2068-2071
-
-
Yue, J.1
Ma, C.2
Yu, H.3
Zhou, W.4
-
264
-
-
84921323282
-
Interference exploitation in D2D-enabled cellular networks: A secrecy perspective
-
Jan.
-
C. Ma et al., "Interference exploitation in D2D-enabled cellular networks: A secrecy perspective," IEEE Trans. Commun., vol. 63, no. 1, pp. 229-242, Jan. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.1
, pp. 229-242
-
-
Ma, C.1
-
265
-
-
84923299449
-
Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with deviceto-device communications
-
Feb.
-
Z. Chu, K. Cumanan, M. Xu, and Z. Ding, "Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with deviceto-device communications," IET Commun., vol. 9, no. 3, pp. 396-403, Feb. 2015.
-
(2015)
IET Commun.
, vol.9
, Issue.3
, pp. 396-403
-
-
Chu, Z.1
Cumanan, K.2
Xu, M.3
Ding, Z.4
-
266
-
-
84925881945
-
PHY-layer resiliency in OFDM communications: A tutorial
-
1st Quart.
-
C. Shahriar et al., "PHY-layer resiliency in OFDM communications: A tutorial," IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 292-314, 1st Quart., 2015.
-
(2015)
IEEE Commun. Surveys Tuts.
, vol.17
, Issue.1
, pp. 292-314
-
-
Shahriar, C.1
-
267
-
-
80055109229
-
Research on secrecy capacity oriented relay selection for mobile cooperative networks
-
Beijing, China, Sep.
-
L. Wang, T. Ke, M. Song, Y. Wei, and Y. Teng, "Research on secrecy capacity oriented relay selection for mobile cooperative networks," in Proc. IEEE CCIS, Beijing, China, Sep. 2011, pp. 443-447.
-
(2011)
Proc. IEEE CCIS
, pp. 443-447
-
-
Wang, L.1
Ke, T.2
Song, M.3
Wei, Y.4
Teng, Y.5
-
268
-
-
84979824607
-
A survey on wireless security: Technical challenges, recent advances, and future trends
-
Sep.
-
Y. Zou, J. Zhu, X. Wang, and L. Hanzo, "A survey on wireless security: Technical challenges, recent advances, and future trends," Proc. IEEE, vol. 104, no. 9, pp. 1727-1765, Sep. 2016.
-
(2016)
Proc. IEEE
, vol.104
, Issue.9
, pp. 1727-1765
-
-
Zou, Y.1
Zhu, J.2
Wang, X.3
Hanzo, L.4
|