-
1
-
-
84962332990
-
A time efficient tag identification algorithm using dual prefix probe scheme (DPPS)
-
Mar.
-
J. Su, Z. Sheng, G. Wen, and V. C. M. Leung, "A time efficient tag identification algorithm using dual prefix probe scheme (DPPS)," IEEE Signal Process. Lett., vol. 23, no. 3, pp. 386-389, Mar. 2016.
-
(2016)
IEEE Signal Process. Lett.
, vol.23
, Issue.3
, pp. 386-389
-
-
Su, J.1
Sheng, Z.2
Wen, G.3
Leung, V.C.M.4
-
2
-
-
84927712570
-
Safeguarding 5G wireless communication networks using physical layer security
-
Apr.
-
N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. Di Renzo, "Safeguarding 5G wireless communication networks using physical layer security," IEEE Commun. Mag., vol. 53, no. 4, pp. 20-27, Apr. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.4
, pp. 20-27
-
-
Yang, N.1
Wang, L.2
Geraci, G.3
Elkashlan, M.4
Yuan, J.5
Di Renzo, M.6
-
3
-
-
0032164539
-
Cryptographic design vulnerabilities
-
Sep.
-
B. Schneier, "Cryptographic design vulnerabilities," Computer, vol. 31, no. 9, pp. 29-33, Sep. 1998.
-
(1998)
Computer
, vol.31
, Issue.9
, pp. 29-33
-
-
Schneier, B.1
-
4
-
-
84867877630
-
Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures
-
Nov.
-
A. Barenghi, L. Breveglieri, I. Koren, and D. Naccache, "Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures," Proc. IEEE, vol. 100, no. 11, pp. 3056-3076, Nov. 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.11
, pp. 3056-3076
-
-
Barenghi, A.1
Breveglieri, L.2
Koren, I.3
Naccache, D.4
-
5
-
-
84906698210
-
Principles of physical layer security in multiuser wireless networks: A survey
-
Aug.
-
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tut., vol. 16, no. 3, pp. 1550-1573, Aug. 2014.
-
(2014)
IEEE Commun. Surveys Tut.
, vol.16
, Issue.3
, pp. 1550-1573
-
-
Mukherjee, A.1
Fakoorian, S.A.A.2
Huang, J.3
Swindlehurst, A.L.4
-
7
-
-
84904788826
-
-
Boca Raton, FL, USA: CRC Press
-
X. Zhou, L. Song, and Y. Zhang, Physical Layer Security in Wireless Communications. Boca Raton, FL, USA: CRC Press, 2013.
-
(2013)
Physical Layer Security in Wireless Communications
-
-
Zhou, X.1
Song, L.2
Zhang, Y.3
-
8
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Labs Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
9
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
10
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. 24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.1
Hellman, M.E.2
-
11
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
12
-
-
85032751776
-
Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
-
Sep.
-
Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 29-40
-
-
Hong, Y.-W.P.1
Lan, P.-C.2
Kuo, C.-C.J.3
-
13
-
-
84924814210
-
A cross-layer secure communication model based on discrete fractional fourier transform (DFRFT)
-
Mar.
-
H. Wen et al., "A cross-layer secure communication model based on discrete fractional Fourier transform (DFRFT)" IEEE Trans. Emerg. Topics Comput., vol. 3, no. 1, pp. 119-126, Mar. 2015.
-
(2015)
IEEE Trans. Emerg. Topics Comput.
, vol.3
, Issue.1
, pp. 119-126
-
-
Wen, H.1
-
14
-
-
84903279448
-
Achieving secure communications over wiretap channels via security codes from resilient functions
-
Jun.
-
H. Wen, P.-H. Ho, and B. Wu, "Achieving secure communications over wiretap channels via security codes from resilient functions," IEEE Wire-less Commun. Lett., vol. 3, no. 3, pp. 273-276, Jun. 2014.
-
(2014)
IEEE Wire-less Commun. Lett.
, vol.3
, Issue.3
, pp. 273-276
-
-
Wen, H.1
Ho, P.-H.2
Wu, B.3
-
15
-
-
77953802876
-
Secure transmission with multiple antennas I: The MISOME wiretap channel
-
Jul.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.7
, pp. 3088-3104
-
-
Khisti, A.1
Wornell, G.W.2
-
16
-
-
77958560746
-
Secure transmission with multiple antennas-part II: The MIMOME wiretap channel
-
Nov.
-
A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.11
, pp. 5515-5532
-
-
Khisti, A.1
Wornell, G.W.2
-
17
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun.
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun.
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
18
-
-
84921405314
-
Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. Artificial fast fading
-
Jan.
-
H.-M. Wang, T.-X. Zheng, and X.-G. Xia, "Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. artificial fast fading," IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 94-106, Jan. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.1
, pp. 94-106
-
-
Wang, H.-M.1
Zheng, T.-X.2
Xia, X.-G.3
-
19
-
-
84883698532
-
On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
-
Sep.
-
P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1728-1740, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1728-1740
-
-
Lin, P.-H.1
Lai, S.-H.2
Lin, S.-C.3
Su, H.-J.4
-
20
-
-
84879203277
-
On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels
-
Jun.
-
X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificial-noiseaided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
-
(2013)
IEEE Trans. Veh. Technol.
, vol.62
, Issue.5
, pp. 2170-2181
-
-
Zhang, X.1
Zhou, X.2
McKay, M.R.3
-
21
-
-
84921324940
-
Secrecy rate maximization with artificialnoise-aided beamforming for MISO wiretap channels under secrecy outage constraint
-
Jan.
-
B. Wang, P. Mu, and Z. Li, "Secrecy rate maximization with artificialnoise-aided beamforming for MISO wiretap channels under secrecy outage constraint," IEEE Commun. Lett., vol. 19, no. 1, pp. 18-21, Jan. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.1
, pp. 18-21
-
-
Wang, B.1
Mu, P.2
Li, Z.3
-
22
-
-
85027679625
-
Associating MIMO beamforming with security codes to achieve unconditional communication security
-
Aug.
-
J. Tang et al., "Associating MIMO beamforming with security codes to achieve unconditional communication security," IET Commun., vol. 10, no. 12, pp. 1522-1531, Aug. 2016.
-
(2016)
IET Commun.
, vol.10
, Issue.12
, pp. 1522-1531
-
-
Tang, J.1
-
23
-
-
84960156001
-
Multiantenna transmission with artificial noise against randomly distributed eavesdroppers
-
Nov.
-
T.-X. Zheng, H.-M. Wang, J. Yuan, D. Towsley, and M. H. Lee, "Multiantenna transmission with artificial noise against randomly distributed eavesdroppers," IEEE Trans. Commun., vol. 63, no. 11, pp. 4347-4362, Nov. 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.11
, pp. 4347-4362
-
-
Zheng, T.-X.1
Wang, H.-M.2
Yuan, J.3
Towsley, D.4
Lee, M.H.5
-
24
-
-
85027039668
-
Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers
-
T.-X. Zheng and H.-M. Wang, "Optimal power allocation for artificial noise under imperfect CSI against spatially random eavesdroppers," IEEE Trans. Veh. Technol., 2016, doi: 10.1109/TVT.2015.2513003.
-
(2016)
IEEE Trans. Veh. Technol.
-
-
Zheng, T.-X.1
Wang, H.-M.2
-
25
-
-
85032751357
-
Cooperative security at the physical layer: A summary of recent advances
-
Sep.
-
R. Bassily et al., "Cooperative security at the physical layer: A summary of recent advances," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 16-28, Sep. 2013.
-
(2013)
IEEE Signal Process. Mag.
, vol.30
, Issue.5
, pp. 16-28
-
-
Bassily, R.1
-
26
-
-
84961815117
-
Physical layer security in wireless cooperative relay networks: State of the art and beyond
-
Dec.
-
L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and S. Shetty, "Physical layer security in wireless cooperative relay networks: State of the art and beyond," IEEE Commun. Mag., vol. 53, no. 12, pp. 32-39, Dec. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.12
, pp. 32-39
-
-
Rodriguez, L.J.1
Tran, N.H.2
Duong, T.Q.3
Le-Ngoc, T.4
Elkashlan, M.5
Shetty, S.6
-
27
-
-
84961793621
-
Enhancing wireless secrecy via cooperation: Signal design and optimization
-
Dec.
-
H.-M. Wang and X.-G. Xia, "Enhancing wireless secrecy via cooperation: Signal design and optimization," IEEE Commun. Mag., vol. 53, no. 12, pp. 47-53, Dec. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.12
, pp. 47-53
-
-
Wang, H.-M.1
Xia, X.-G.2
-
28
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar.
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Pro-cess., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Pro-cess.
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
29
-
-
84870512709
-
Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no Eavesdropper's CSI
-
Jan.
-
H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
-
(2013)
IEEE Signal Process. Lett.
, vol.20
, Issue.1
, pp. 39-42
-
-
Wang, H.-M.1
Luo, M.2
Xia, X.-G.3
Yin, Q.4
-
30
-
-
84953721841
-
Secure green communication for amplify-and-forward relaying with eavesdroppers
-
Jun.
-
D. Wang, B. Bai, W. Chen, and Z. Han, "Secure green communication for amplify-and-forward relaying with eavesdroppers," in Proc. IEEE ICC, Jun. 2015, pp. 4468-4473.
-
(2015)
Proc. IEEE ICC
, pp. 4468-4473
-
-
Wang, D.1
Bai, B.2
Chen, W.3
Han, Z.4
-
31
-
-
84930197364
-
Outage constrained secrecy throughput maximization for DF relay networks
-
May
-
T. X. Zheng, H. M. Wang, F. Liu, and M. H. Lee, "Outage constrained secrecy throughput maximization for DF relay networks," IEEE Trans. Commun., vol. 63, no. 5, pp. 1741-1755, May 2015.
-
(2015)
IEEE Trans. Commun.
, vol.63
, Issue.5
, pp. 1741-1755
-
-
Zheng, T.X.1
Wang, H.M.2
Liu, F.3
Lee, M.H.4
-
32
-
-
84922896499
-
Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
-
Feb.
-
C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.2
, pp. 589-605
-
-
Wang, C.1
Wang, H.-M.2
Xia, X.-G.3
-
33
-
-
84920830630
-
Secrecy transmission with a helper: To relay or to jam
-
Feb.
-
H. Deng, H. M. Wang, W. Guo, and W. Wang, "Secrecy transmission with a helper: To relay or to jam," IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 293-307, Feb. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.2
, pp. 293-307
-
-
Deng, H.1
Wang, H.M.2
Guo, W.3
Wang, W.4
-
34
-
-
84893471921
-
Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and jammer scaling law
-
Feb.
-
J. H. Lee and W. Choi, "Multiuser diversity for secrecy communications using opportunistic jammer selection: Secure DoF and jammer scaling law," IEEE Trans. Signal Process., vol. 62, no. 4, pp. 828-839, Feb. 2014.
-
(2014)
IEEE Trans. Signal Process
, vol.62
, Issue.4
, pp. 828-839
-
-
Lee, J.H.1
Choi, W.2
-
35
-
-
84959206189
-
Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint
-
Dec.
-
P. Mu, X. Hu, B. Wang, and Z. Li, "Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint," IEEE Commun. Lett., vol. 19, no. 12, pp. 2174-2177, Dec. 2015.
-
(2015)
IEEE Commun. Lett.
, vol.19
, Issue.12
, pp. 2174-2177
-
-
Mu, P.1
Hu, X.2
Wang, B.3
Li, Z.4
-
36
-
-
84929327918
-
Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach
-
May
-
C. Wang, H. M. Wang, X. G. Xia, and C. Liu, "Uncoordinated jammer selection for securing SIMOME wiretap channels: A stochastic geometry approach," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2596-2612, May 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.5
, pp. 2596-2612
-
-
Wang, C.1
Wang, H.M.2
Xia, X.G.3
Liu, C.4
-
37
-
-
84929359010
-
Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
-
May
-
Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. Le Goff, "Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer," IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 1833-1847, May 2015.
-
(2015)
IEEE Trans. Veh. Technol.
, vol.64
, Issue.5
, pp. 1833-1847
-
-
Chu, Z.1
Cumanan, K.2
Ding, Z.3
Johnston, M.4
Le Goff, S.5
-
38
-
-
84981303335
-
Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming
-
May
-
L. Hu, B. Wu, J. Tang, F. Pan, and H. Wen, "Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming," in Proc. IEEE ICC, May 2016, pp. 1-5.
-
(2016)
Proc. IEEE ICC
, pp. 1-5
-
-
Hu, L.1
Wu, B.2
Tang, J.3
Pan, F.4
Wen, H.5
-
39
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H.-M. Wang, Q. Yin, and X.-G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks," IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.-M.1
Yin, Q.2
Xia, X.-G.3
-
40
-
-
84888318377
-
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
-
Dec.
-
H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 2007-2020
-
-
Wang, H.-M.1
Luo, M.2
Yin, Q.3
Xia, X.-G.4
-
41
-
-
85027407300
-
Mode selection in MU-MIMO downlink networks: A physical-layer security perspective
-
X. Chen and Y. Zhang, "Mode selection in MU-MIMO downlink networks: A physical-layer security perspective," IEEE Syst. J., 2015, doi: 10.1109/JSYST.2015.2413843.
-
(2015)
IEEE Syst. J.
-
-
Chen, X.1
Zhang, Y.2
-
42
-
-
84959543225
-
Base station cooperation for confidential broadcasting in multi-cell networks
-
Oct.
-
B. He, N. Yang, X. Zhou, and J. Yuan, "Base station cooperation for confidential broadcasting in multi-cell networks," IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5287-5299, Oct. 2015.
-
(2015)
IEEE Trans. Wireless Commun.
, vol.14
, Issue.10
, pp. 5287-5299
-
-
He, B.1
Yang, N.2
Zhou, X.3
Yuan, J.4
-
43
-
-
79952846257
-
The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel
-
Apr.
-
E. Ekrem and S. Ulukus, "The secrecy capacity region of the Gaussian MIMO multi-receiver wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 2083-2114, Apr. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.4
, pp. 2083-2114
-
-
Ekrem, E.1
Ulukus, S.2
-
44
-
-
79960996804
-
The secrecy capacity of the MIMO wiretap channel
-
Aug.
-
F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.8
, pp. 4961-4972
-
-
Oggier, F.1
Hassibi, B.2
-
45
-
-
84867619190
-
Detecting passive eavesdroppers in the MIMO wiretap channel
-
Mar.
-
A. Mukherjee and A. L. Swindlehurst, "Detecting passive eavesdroppers in the MIMO wiretap channel," in Proc. IEEE ICASSP, Mar. 2012, pp. 2809-2812.
-
(2012)
Proc. IEEE ICASSP
, pp. 2809-2812
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
46
-
-
45249104850
-
Wireless information-theoretic security
-
Jun.
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S.W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
47
-
-
79951647261
-
Optimal beamforming in interference networks with perfect local channel information
-
Mar.
-
R. Mochaourab and E. A. Jorswieck, "Optimal beamforming in interference networks with perfect local channel information," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1128-1141, Mar. 2011.
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1128-1141
-
-
Mochaourab, R.1
Jorswieck, E.A.2
-
48
-
-
78649738324
-
Multi-cell MIMO cooperative networks: A new look at interference
-
Dec.
-
D. Gesbert, S. Hanly, H. Huang, S. S. Shitz, O. Simeone, and W. Yu, "Multi-cell MIMO cooperative networks: A new look at interference," IEEE J. Sel. Areas Commun., vol. 28, no. 9, pp. 1380-1408, Dec. 2010.
-
(2010)
IEEE J. Sel. Areas Commun.
, vol.28
, Issue.9
, pp. 1380-1408
-
-
Gesbert, D.1
Hanly, S.2
Huang, H.3
Shitz, S.S.4
Simeone, O.5
Yu, W.6
|