-
1
-
-
84939457021
-
Secure transmission in MIMO wiretap channels using general-order transmit antenna selection with outdated CSI
-
Aug.
-
Y. Huang, F. S. Al-Qahtani, T. Q. Duong, and J. Wang, "Secure transmission in MIMO wiretap channels using general-order transmit antenna selection with outdated CSI," IEEE Trans. Commun., vol. 63, no. 8, pp. 2959-2971, Aug. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.8
, pp. 2959-2971
-
-
Huang, Y.1
Al-Qahtani, F.S.2
Duong, T.Q.3
Wang, J.4
-
2
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
3
-
-
0016562514
-
The wire-tap channel
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
84890880018
-
Outage and ser performance of spectrum sharing system with TAS/MRC
-
Budapest, Hungary, Jun.
-
F. A. Khan, K. Tourki, M.-S. Alouini, and K. A. Qaraqe, "Outage and SER performance of spectrum sharing system with TAS/MRC," in Proc. IEEE Int. Conf. Commun. Workshops (ICC), Budapest, Hungary, Jun. 2013, pp. 381-385.
-
(2013)
Proc. IEEE Int. Conf. Commun. Workshops (ICC)
, pp. 381-385
-
-
Khan, F.A.1
Tourki, K.2
Alouini, M.-S.3
Qaraqe, K.A.4
-
5
-
-
84893453982
-
Performance analysis of a power limited spectrum sharing system with TAS/MRC
-
Feb.
-
F. A. Khan, K. Tourki, M.-S. Alouini, and K. A. Qaraqe, "Performance analysis of a power limited spectrum sharing system with TAS/MRC," IEEE Trans. Signal Process., vol. 62, no. 4, pp. 954-967, Feb. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.4
, pp. 954-967
-
-
Khan, F.A.1
Tourki, K.2
Alouini, M.-S.3
Qaraqe, K.A.4
-
6
-
-
84895918193
-
Exact performance analysis of MIMO cognitive radio systems using transmit antenna selection
-
Mar.
-
K. Tourki, F. A. Khan, K. A. Qaraqe, H.-C. Yang, and M.-S. Alouini, "Exact performance analysis of MIMO cognitive radio systems using transmit antenna selection," IEEE J. Sel. Areas Commun., vol. 32, no. 3, pp. 425-438, Mar. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.3
, pp. 425-438
-
-
Tourki, K.1
Khan, F.A.2
Qaraqe, K.A.3
Yang, H.-C.4
Alouini, M.-S.5
-
7
-
-
84873731253
-
Transmit antenna selection for security enhancement in MIMO wiretap channels
-
Jan.
-
N. Yang, P. L. Yeoh, M. Elkashlan, R. Schober, and I. B. Collings, "Transmit antenna selection for security enhancement in MIMO wiretap channels," IEEE Trans. Commun., vol. 61, no. 1, pp. 144-154, Jan. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.1
, pp. 144-154
-
-
Yang, N.1
Yeoh, P.L.2
Elkashlan, M.3
Schober, R.4
Collings, I.B.5
-
8
-
-
84897913176
-
Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels
-
Mar.
-
S. Yan, N. Yang, R. Malaney, and J. Yuan, "Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1656-1667, Mar. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.3
, pp. 1656-1667
-
-
Yan, S.1
Yang, N.2
Malaney, R.3
Yuan, J.4
-
9
-
-
84910151447
-
Secure transmission with antenna selection in MIMO Nakagami-m fading channels
-
Nov.
-
L. Wang, M. Elkashlan, J. Huang, R. Schober, and R. K. Mallik, "Secure transmission with antenna selection in MIMO Nakagami-m fading channels," IEEE Trans. Commun., vol. 13, no. 11, pp. 6054-6067, Nov. 2014.
-
(2014)
IEEE Trans. Commun.
, vol.13
, Issue.11
, pp. 6054-6067
-
-
Wang, L.1
Elkashlan, M.2
Huang, J.3
Schober, R.4
Mallik, R.K.5
-
10
-
-
84933037222
-
Secrecy performance analysis for TAS-MRC system with imperfect feedback
-
Aug.
-
J. Xiong, Y. Tang, D. Ma, P. Xiao, and K. K. Wong, "Secrecy performance analysis for TAS-MRC system with imperfect feedback," IEEE Trans. Inf. Forensics Security, vol. 10, no. 8, pp. 1617-1629, Aug. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.8
, pp. 1617-1629
-
-
Xiong, J.1
Tang, Y.2
Ma, D.3
Xiao, P.4
Wong, K.K.5
-
11
-
-
84964907096
-
Proactive spectrum sharing incentive for physical layer security enhancement
-
San Diego, CA, USA, Dec.
-
K. Tourki and M. O. Hasna, "Proactive spectrum sharing incentive for physical layer security enhancement," in Proc. IEEE Global Commun. Conf. (GLOBECOM), San Diego, CA, USA, Dec. 2015, pp. 1-6.
-
(2015)
Proc. IEEE Global Commun. Conf. (GLOBECOM)
, pp. 1-6
-
-
Tourki, K.1
Hasna, M.O.2
-
12
-
-
84987856212
-
Proactive spectrum sharing incentive for physical layer security enhancement using outdated CSI
-
Jun.
-
K. Tourki and M. O. Hasna, "Proactive spectrum sharing incentive for physical layer security enhancement using outdated CSI," IEEE Trans. Wireless Commun., vol. 15, no. 9, pp. 6273-6283, Jun. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.9
, pp. 6273-6283
-
-
Tourki, K.1
Hasna, M.O.2
-
13
-
-
84959348023
-
On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping
-
Jan.
-
J. Zhu, Y. Zou, G. Wang, Y.-D. Yao, and G. K. Karagiannidis, "On secrecy performance of antenna-selection-aided MIMO systems against eavesdropping," IEEE Trans. Veh. Technol., vol. 65, no. 1, pp. 214-225, Jan. 2016.
-
(2016)
IEEE Trans. Veh. Technol.
, vol.65
, Issue.1
, pp. 214-225
-
-
Zhu, J.1
Zou, Y.2
Wang, G.3
Yao, Y.-D.4
Karagiannidis, G.K.5
-
14
-
-
84929646224
-
Secrecy outage analysis of MU-MIMO transmit antenna selection systems with arbitrary number of eavesdropping users
-
May
-
Y. Hu and X. Tao, "Secrecy outage analysis of MU-MIMO transmit antenna selection systems with arbitrary number of eavesdropping users," Electron. Lett., vol. 51, no. 11, pp. 874-876, May 2015.
-
(2015)
Electron. Lett.
, vol.51
, Issue.11
, pp. 874-876
-
-
Hu, Y.1
Tao, X.2
-
15
-
-
84992143057
-
Large system analysis of artificial noise assisted communication in the multiuser downlink: Ergodic secrecy sum-rate and optimal power allocation
-
to be published
-
N. Li, X. Tao, H. Wu, J. Xu, and Q. Cui, "Large system analysis of artificial noise assisted communication in the multiuser downlink: Ergodic secrecy sum-rate and optimal power allocation," IEEE Trans. Veh. Technol., to be published.
-
IEEE Trans. Veh. Technol.
-
-
Li, N.1
Tao, X.2
Wu, H.3
Xu, J.4
Cui, Q.5
-
16
-
-
84893471921
-
Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and jammer scaling law
-
Feb.
-
J. Lee and W. Choi, "Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and jammer scaling law," IEEE Trans. Signal Process., vol. 62, no. 4, pp. 828-839, Feb. 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.4
, pp. 828-839
-
-
Lee, J.1
Choi, W.2
-
17
-
-
84937146871
-
Secure transmission for multiuser relay networks
-
Jul.
-
S. I. Kim, I. M. Kim, and J. Heo, "Secure transmission for multiuser relay networks," IEEE Trans. Wireless Commun., vol. 14, no. 7, pp. 3724-3737, Jul. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.7
, pp. 3724-3737
-
-
Kim, S.I.1
Kim, I.M.2
Heo, J.3
-
18
-
-
84891743872
-
Physical-layer security with multiuser scheduling in cognitive radio networks
-
Dec.
-
Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.12
, pp. 5103-5113
-
-
Zou, Y.1
Wang, X.2
Shen, W.3
-
19
-
-
84893766010
-
On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling
-
Jan.
-
M. Pei, A. L. Swindlehurst, D. Ma, and J. Wei, "On ergodic secrecy rate for MISO wiretap broadcast channels with opportunistic scheduling," IEEE Commun. Lett., vol. 18, no. 1, pp. 50-53, Jan. 2014.
-
(2014)
IEEE Commun. Lett.
, vol.18
, Issue.1
, pp. 50-53
-
-
Pei, M.1
Swindlehurst, A.L.2
Ma, D.3
Wei, J.4
-
20
-
-
84938703488
-
Opportunistic fair resource sharing with secrecy considerations in uplink wiretap channels
-
New Orleans, LA, USA, Mar.
-
X. Ge, H. Jin, X. Li, and V. C. M. Leung, "Opportunistic fair resource sharing with secrecy considerations in uplink wiretap channels," in Proc. IEEE Wireless Commun. Netw. Conf., New Orleans, LA, USA, Mar. 2015, pp. 1422-1427.
-
(2015)
Proc. IEEE Wireless Commun. Netw. Conf.
, pp. 1422-1427
-
-
Ge, X.1
Jin, H.2
Li, X.3
Leung, V.C.M.4
-
21
-
-
17144398925
-
Multiuser switched diversity transmission
-
Milan, Italy, Sep.
-
B. Holter, M.-S. Alouini, G. E. Oien, and H.-C. Yang, "Multiuser switched diversity transmission," in Proc. IEEE Veh. Technol. Conf., Milan, Italy, Sep. 2004, pp. 2038-2043.
-
(2004)
Proc. IEEE Veh. Technol. Conf.
, pp. 2038-2043
-
-
Holter, B.1
Alouini, M.-S.2
Oien, G.E.3
Yang, H.-C.4
-
22
-
-
31144453680
-
Improving the performance of switched diversity with post-examining selection
-
Jan.
-
H.-C. Yang and M.-S. Alouini, "Improving the performance of switched diversity with post-examining selection," IEEE Trans. Wireless Commun., vol. 5, no. 1, pp. 67-71, Jan. 2006.
-
(2006)
IEEE Trans. Wireless Commun.
, vol.5
, Issue.1
, pp. 67-71
-
-
Yang, H.-C.1
Alouini, M.-S.2
-
23
-
-
33947577395
-
Multiuser diversity with quantized feedback
-
Jan.
-
Y. S. Al-harthi, A. H. Tewfik, and M.-S. Alouini, "Multiuser diversity with quantized feedback," IEEE Trans. Wireless Commun., vol. 6, no. 1, pp. 330-337, Jan. 2007.
-
(2007)
IEEE Trans. Wireless Commun.
, vol.6
, Issue.1
, pp. 330-337
-
-
Al-Harthi, Y.S.1
Tewfik, A.H.2
Alouini, M.-S.3
-
24
-
-
65949083771
-
Thresholdbased parallel multiuser scheduling
-
Apr.
-
S. S. Nam, M.-S. Alouini, H.-C. Yang, and K. A. Qaraqe, "Thresholdbased parallel multiuser scheduling," IEEE Trans. Wireless Commun., vol. 8, no. 4, pp. 2150-2159, Apr. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.4
, pp. 2150-2159
-
-
Nam, S.S.1
Alouini, M.-S.2
Yang, H.-C.3
Qaraqe, K.A.4
-
25
-
-
77952557222
-
Multiuser switched diversity scheduling systems with per-user threshold
-
May
-
H. Nam and M.-S. Alouini, "Multiuser switched diversity scheduling systems with per-user threshold," IEEE Trans. Commun., vol. 58, no. 5, pp. 1321-1326, May 2010.
-
(2010)
IEEE Trans. Commun.
, vol.58
, Issue.5
, pp. 1321-1326
-
-
Nam, H.1
Alouini, M.-S.2
-
26
-
-
84866738520
-
Multiuser switched diversity scheduling schemes
-
Sep.
-
M. Shaqfeh, H. Alnuweiri, and M. S. Alouini, "Multiuser switched diversity scheduling schemes," IEEE Trans. Commun., vol. 60, no. 9, pp. 2499-2510, Sep. 2012.
-
(2012)
IEEE Trans. Commun.
, vol.60
, Issue.9
, pp. 2499-2510
-
-
Shaqfeh, M.1
Alnuweiri, H.2
Alouini, M.S.3
-
27
-
-
84866611738
-
Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems
-
Sep.
-
Z. Bouida, K. Tourki, A. Ghrayeb, K. Qaraqe, and M. S. Alouini, "Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems," IEEE Commun. Lett., vol. 16, no. 9, pp. 1482-1485, Sep. 2012.
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.9
, pp. 1482-1485
-
-
Bouida, Z.1
Tourki, K.2
Ghrayeb, A.3
Qaraqe, K.4
Alouini, M.S.5
-
28
-
-
84919459903
-
Secrecy outage analysis of transmit antenna selection with switch-and-examine combining over Rayleigh fading
-
Vancouver, BC, Canada, Sep.
-
Y. Hu, X. Tao, J. Xu, and Q. Cui, "Secrecy outage analysis of transmit antenna selection with switch-and-examine combining over Rayleigh fading," in Proc. IEEE Veh. Technol. Conf., Vancouver, BC, Canada, Sep. 2014, pp. 1-5.
-
(2014)
Proc. IEEE Veh. Technol. Conf.
, pp. 1-5
-
-
Hu, Y.1
Tao, X.2
Xu, J.3
Cui, Q.4
-
29
-
-
84969969845
-
Ergodic secrecy capacity for downlink multiuser networks using switch-and-examine combining with post-selection scheduling scheme
-
Apr.
-
M. Yang, B. Zhang, Y. Huang, D. Guo, and X. Yi, "Ergodic secrecy capacity for downlink multiuser networks using switch-and-examine combining with post-selection scheduling scheme," Electron. Lett., vol. 52, no. 9, pp. 720-722, Apr. 2016.
-
(2016)
Electron. Lett.
, vol.52
, Issue.9
, pp. 720-722
-
-
Yang, M.1
Zhang, B.2
Huang, Y.3
Guo, D.4
Yi, X.5
-
30
-
-
84992092810
-
Secrecy outage analysis of multiuser downlink wiretap networks with SECps scheduling in Nakagami-m channel
-
Oct.
-
M. Yang, B. Zhang, Y. Huang, and D. Guo, "Secrecy outage analysis of multiuser downlink wiretap networks with SECps scheduling in Nakagami-m channel," IEEE Wireless Commun. Lett., vol. 5, no. 5, pp. 492-495, Oct. 2016.
-
(2016)
IEEE Wireless Commun. Lett.
, vol.5
, Issue.5
, pp. 492-495
-
-
Yang, M.1
Zhang, B.2
Huang, Y.3
Guo, D.4
-
31
-
-
84962205062
-
An improved threshold-based channel selection scheme for wireless communication systems
-
Feb.
-
P. S. Bithas, A. A. Rontogiannis, and G. K. Karagiannidis, "An improved threshold-based channel selection scheme for wireless communication systems," IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1531-1546, Feb. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.2
, pp. 1531-1546
-
-
Bithas, P.S.1
Rontogiannis, A.A.2
Karagiannidis, G.K.3
-
32
-
-
84976336467
-
Exploiting direct links for physical layer security in multiuser multirelay networks
-
Jun.
-
L. Fan, N. Yang, T. Duong, M. Elkashlan, and G. Karagiannidis, "Exploiting direct links for physical layer security in multiuser multirelay networks," IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 3856-3867, Jun. 2016.
-
(2016)
IEEE Trans. Wireless Commun.
, vol.15
, Issue.6
, pp. 3856-3867
-
-
Fan, L.1
Yang, N.2
Duong, T.3
Elkashlan, M.4
Karagiannidis, G.5
-
33
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
34
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
35
-
-
79951681560
-
Secure wireless network connectivity with multi-antenna transmission
-
Feb.
-
X. Zhou, R. K. Ganti, and J. G. Andrews, "Secure wireless network connectivity with multi-antenna transmission," IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 425-430, Feb. 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.2
, pp. 425-430
-
-
Zhou, X.1
Ganti, R.K.2
Andrews, J.G.3
-
36
-
-
84860255627
-
On secrecy capacity scaling in wireless networks
-
May
-
O. O. Koyluoglu, C. E. Koksal, and H. El-Gamal, "On secrecy capacity scaling in wireless networks," IEEE Trans. Inf. Theory, vol. 58, no. 5, pp. 3000-3015, May 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.5
, pp. 3000-3015
-
-
Koyluoglu, O.O.1
Koksal, C.E.2
El-Gamal, H.3
-
37
-
-
84949870813
-
On secure wireless communications for IoT under eavesdropper collusion
-
Jul.
-
Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, "On secure wireless communications for IoT under eavesdropper collusion," IEEE Trans. Autom. Sci. Eng., vol. 13, no. 3, pp. 1281-1293, Jul. 2016.
-
(2016)
IEEE Trans. Autom. Sci. Eng.
, vol.13
, Issue.3
, pp. 1281-1293
-
-
Zhang, Y.1
Shen, Y.2
Wang, H.3
Yong, J.4
Jiang, X.5
-
38
-
-
84960403608
-
A new secure transmission scheme with outdated antenna selection
-
Nov.
-
J. Hu, Y. Cai, N. Yang, and W. Yang, "A new secure transmission scheme with outdated antenna selection," IEEE Trans. Inf. Forensics Security, vol. 10, no. 11, pp. 2435-2446, Nov. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.11
, pp. 2435-2446
-
-
Hu, J.1
Cai, Y.2
Yang, N.3
Yang, W.4
-
39
-
-
84893403880
-
Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels
-
Feb.
-
L. Wang, N. Yang, M. Elkashlan, P. L. Yeoh, and J. Yuan, "Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 247-258, Feb. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.2
, pp. 247-258
-
-
Wang, L.1
Yang, N.2
Elkashlan, M.3
Yeoh, P.L.4
Yuan, J.5
-
40
-
-
84919796320
-
Security enhancement of cooperative single carrier systems
-
Jan.
-
L. Wang, K. J. Kim, T. Q. Duong, M. Elkashlan, and H. V. Poor, "Security enhancement of cooperative single carrier systems," IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 90-103, Jan. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.1
, pp. 90-103
-
-
Wang, L.1
Kim, K.J.2
Duong, T.Q.3
Elkashlan, M.4
Poor, H.V.5
-
41
-
-
0003498504
-
-
7th ed. San Diego, CA, USA: Academic
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. San Diego, CA, USA: Academic, 2007.
-
(2007)
Table of Integrals, Series, and Products
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
-
42
-
-
0003851731
-
-
9th ed. New York, NY, USA: Dover
-
M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematical Tables, 9th ed. New York, NY, USA: Dover, 1972.
-
(1972)
Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematical Tables
-
-
Abramowitz, M.1
Stegun, I.A.2
|