-
2
-
-
84890522850
-
Communication theory of secrecy systems
-
Apr.
-
C. E. Shannon, "Communication theory of secrecy systems, " Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Apr. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
3
-
-
0016562514
-
The wire-tap channel
-
Oct.
-
A. D. Wyner, "The wire-tap channel, " Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
4
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul.
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel, " IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
5
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels, " IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
6
-
-
4544354908
-
Correlated jamming on MIMO Gaussian fading channels
-
Sep.
-
A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels, " IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2119-2123, Sep. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.9
, pp. 2119-2123
-
-
Kashyap, A.1
Basar, T.2
Srikant, R.3
-
7
-
-
44049095259
-
Spatially-correlated jamming in Gaussian multiple access and broadcast channels
-
Mar.
-
M. H. Brady, M. Mohseni, and J. M. Cioffi, "Spatially-correlated jamming in gaussian multiple access and broadcast channels, " in Proc. Inf. Sci. Syst., Mar. 2006, pp. 1635-1639.
-
(2006)
Proc. Inf. Sci. Syst.
, pp. 1635-1639
-
-
Brady, M.H.1
Mohseni, M.2
Cioffi, J.M.3
-
8
-
-
45249101530
-
The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming
-
Jun.
-
E. Tekin and A. Yener, "The general Gaussian multiple-access and twoway wiretap channels: Achievable rates and cooperative jamming, " IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735-2751, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2735-2751
-
-
Tekin, E.1
Yener, A.2
-
9
-
-
84883785476
-
Improving physical layer secrecy using full-duplex jamming receivers
-
Jun.
-
G. Zheng, I. Krikidis, J. Li, A. P. Petropulu, and B. Ottersten, "Improving physical layer secrecy using full-duplex jamming receivers, " IEEE Trans. Signal Process., vol. 61, no. 20, pp. 4962-4974, Jun. 2013.
-
(2013)
IEEE Trans. Signal Process.
, vol.61
, Issue.20
, pp. 4962-4974
-
-
Zheng, G.1
Krikidis, I.2
Li, J.3
Petropulu, A.P.4
Ottersten, B.5
-
11
-
-
84992213754
-
Game theorybased active defense for intrusion detection in cyber-physical embedded systems
-
Oct.
-
K. Wang, M. Du, D. Yang, C. Zhu, J. Shen, and Y. Zhang, "Game theorybased active defense for intrusion detection in cyber-physical embedded systems, " ACM Trans. Embedded Comput. Syst., vol. 16, no. 1, Oct. 2016, Art. no. 18.
-
(2016)
ACM Trans. Embedded Comput. Syst.
, vol.16
, Issue.1
-
-
Wang, K.1
Du, M.2
Yang, D.3
Zhu, C.4
Shen, J.5
Zhang, Y.6
-
12
-
-
84859087475
-
Nash equilibrium of node cooperation based on metamodel for MANETs
-
Mar.
-
K. Wang and M. Wu, "Nash equilibrium of node cooperation based on metamodel for MANETs, " J. Inf. Sci. Eng., vol. 28, no. 2, pp. 317-333, Mar. 2012.
-
(2012)
J. Inf. Sci. Eng.
, vol.28
, Issue.2
, pp. 317-333
-
-
Wang, K.1
Wu, M.2
-
13
-
-
84921773816
-
Secure relay and jammer selection for physical layer security
-
Jan.
-
H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, "Secure relay and jammer selection for physical layer security, " IEEE Signal Process. Lett., vol. 22, no. 8, pp. 1147-1151, Jan. 2015.
-
(2015)
IEEE Signal Process. Lett.
, vol.22
, Issue.8
, pp. 1147-1151
-
-
Hui, H.1
Swindlehurst, A.L.2
Li, G.3
Liang, J.4
-
14
-
-
84883287296
-
Coping with a smart jammer in wireless networks: AStackelberg game approach
-
Jul.
-
D. Yang, G. Xue, J. Zhang, A. Richa, and X. Fang, "Coping with a smart jammer in wireless networks: AStackelberg game approach, " IEEE Trans. Wireless Commun., vol. 12, no. 8, pp. 4038-4047, Jul. 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.8
, pp. 4038-4047
-
-
Yang, D.1
Xue, G.2
Zhang, J.3
Richa, A.4
Fang, X.5
-
15
-
-
48049102969
-
The Gaussian multiple access wire-tap channel: Wireless secrecy and cooperative jamming
-
Feb.
-
E. Tekin, "The Gaussian multiple access wire-tap channel: Wireless secrecy and cooperative jamming, " in Proc. Inf. Theory Appl. Workshop, Feb. 2007, pp. 404-413.
-
(2007)
Proc. Inf. Theory Appl. Workshop
, pp. 404-413
-
-
Tekin, E.1
-
16
-
-
76649135514
-
Physical layer security game: Interaction between source, eavesdropper, and friendly jammer
-
Mar.
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: Interaction between source, eavesdropper, and friendly jammer, " EURASIP J. Wireless Commun. Netw., vol. 2009, no. 11, pp. 1-10, Mar. 2009.
-
(2009)
EURASIP J. Wireless Commun. Netw.
, vol.2009
, Issue.11
, pp. 1-10
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
17
-
-
84922280033
-
Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
-
Jan.
-
Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, "Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing, " IEICE Trans. Commun., vol. E98-B, no. 1, pp. 190-200, Jan. 2015.
-
(2015)
IEICE Trans. Commun.
, vol.E98-B
, Issue.1
, pp. 190-200
-
-
Fu, Z.1
Sun, X.2
Liu, Q.3
Zhou, L.4
Shu, J.5
-
18
-
-
84926455204
-
Social network and tag sources based augmenting collaborative recommender system
-
Apr.
-
T. Ma et al., "Social network and tag sources based augmenting collaborative recommender system, " IEICE Trans. Inf. Syst., vol. E98-D, no. 4, pp. 902-910, Apr. 2015.
-
(2015)
IEICE Trans. Inf. Syst.
, vol.E98-D
, Issue.4
, pp. 902-910
-
-
Ma, T.1
-
19
-
-
84983268338
-
Towards efficient content-aware search over encrypted outsourced data in cloud
-
Apr.
-
Z. Fu, X. Sun, S. Ji, and G. Xie, "Towards efficient content-aware search over encrypted outsourced data in cloud, " in Proc. IEEE INFOCOM, Apr. 2016, pp. 1-6.
-
(2016)
Proc. IEEE INFOCOM
, pp. 1-6
-
-
Fu, Z.1
Sun, X.2
Ji, S.3
Xie, G.4
-
20
-
-
77953552937
-
Cooperative communications based on trust model for mobile ad hoc networks
-
Jun.
-
K. Wang and M. Wu, "Cooperative communications based on trust model for mobile ad hoc networks, " IET Inf. Security, vol. 4, no. 2, pp. 68-79, Jun. 2010.
-
(2010)
IET Inf. Security
, vol.4
, Issue.2
, pp. 68-79
-
-
Wang, K.1
Wu, M.2
-
21
-
-
85015100023
-
Attack detection and distributed forensics in machine-to-machine networks
-
Nov.
-
K. Wang, M. Du, Y. Sun, A. Vinel, and Y. Zhang, "Attack detection and distributed forensics in machine-to-machine networks, " IEEE Netw., vol. 30, no. 6, pp. 49-55, Nov. 2016.
-
(2016)
IEEE Netw.
, vol.30
, Issue.6
, pp. 49-55
-
-
Wang, K.1
Du, M.2
Sun, Y.3
Vinel, A.4
Zhang, Y.5
-
22
-
-
84904649422
-
On secrecy capacity of Gaussian wiretap channel aided by a cooperative jammer
-
Jul.
-
L. Li, Z. Chen, and J. Fang, "On secrecy capacity of Gaussian wiretap channel aided by a cooperative jammer, " IEEE Signal Process. Lett., vol. 21, no. 11, pp. 1356-1360, Jul. 2014.
-
(2014)
IEEE Signal Process. Lett.
, vol.21
, Issue.11
, pp. 1356-1360
-
-
Li, L.1
Chen, Z.2
Fang, J.3
-
23
-
-
84873097542
-
Improving secrecy rate via spectrum leasing for friendly jamming
-
Dec.
-
I. Stanojev and A. Yener, "Improving secrecy rate via spectrum leasing for friendly jamming, " IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 134-145, Dec. 2012.
-
(2012)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.1
, pp. 134-145
-
-
Stanojev, I.1
Yener, A.2
-
24
-
-
84973277773
-
Secrecy degrees of freedom of a MIMO Gaussian wiretap channel with a cooperative jammer
-
May
-
L. Li, Z. Chen, J. Fang, and A. P. Petropulu, "Secrecy degrees of freedom of a MIMO Gaussian wiretap channel with a cooperative jammer, " in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process., May 2016, pp. 3486-3490.
-
(2016)
Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
, pp. 3486-3490
-
-
Li, L.1
Chen, Z.2
Fang, J.3
Petropulu, A.P.4
-
25
-
-
84933037312
-
Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
-
Jun.
-
D. Kapetanovic, G. Zheng, and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks, " IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.6
, pp. 21-27
-
-
Kapetanovic, D.1
Zheng, G.2
Rusek, F.3
-
26
-
-
84862635573
-
Distributed beamforming for physical-layer security of two-way relay networks
-
Jul.
-
H. M. Wang, Q. Yin, and X. G. Xia, "Distributed beamforming for physical-layer security of two-way relay networks, " IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3532-3545, Jul. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.7
, pp. 3532-3545
-
-
Wang, H.M.1
Yin, Q.2
Xia, X.G.3
-
27
-
-
84994108270
-
An optimal jammer selection for improving physical-layer security in wireless networks with multiple jammers
-
Sep.
-
H. Huang, X. Zhang, X. Hu, P. Zhang, and Y. Li, "An optimal jammer selection for improving physical-layer security in wireless networks with multiple jammers, " in Proc. Int. Wireless Commun. Mobile Comput. Conf., Sep. 2016, pp. 719-724.
-
(2016)
Proc. Int. Wireless Commun. Mobile Comput. Conf.
, pp. 719-724
-
-
Huang, H.1
Zhang, X.2
Hu, X.3
Zhang, P.4
Li, Y.5
-
28
-
-
70349991516
-
Physical layer security game: How to date a girl with her boyfriend on the same table
-
May
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: How to date a girl with her boyfriend on the same table, " in Proc. GameNets, May 2009, pp. 287-294.
-
(2009)
Proc. GameNets
, pp. 287-294
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
29
-
-
84881035358
-
Fairness-guaranteed pricing and power allocation with a friendly jammer against eavesdropping
-
Oct.
-
J. Yue, B. Yang, and X. Guan, "Fairness-guaranteed pricing and power allocation with a friendly jammer against eavesdropping, " in Proc. Int. Conf. Wireless Commun. Signal Process., Oct. 2012, pp. 1-6.
-
(2012)
Proc. Int. Conf. Wireless Commun. Signal Process.
, pp. 1-6
-
-
Yue, J.1
Yang, B.2
Guan, X.3
-
31
-
-
0028442650
-
Simulated annealing: A proof of convergence
-
Jun.
-
V. Granville, M. Krivanek, and J.-P. Rasson, "Simulated annealing: A proof of convergence, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 16, no. 6, pp. 652-656, Jun. 1994.
-
(1994)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.16
, Issue.6
, pp. 652-656
-
-
Granville, V.1
Krivanek, M.2
Rasson, J.-P.3
-
32
-
-
26444479778
-
Optimization by simulated annealing
-
S. Kirkpatrick, C. Gelatt Jr., and M. Vecchi, "Optimization by simulated annealing, " Science, vol. 220, no. 4598, pp. 671-680, 1983.
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt, C.2
Vecchi, M.3
-
33
-
-
84975769734
-
Cooperative jammer power allocation-A Nash bargaining solutionmethod
-
Oct.
-
B. Duan, Y. Cai, J. Zheng, and W. Yang, "Cooperative jammer power allocation-A Nash bargaining solutionmethod, " in Proc. Int. Conf. Wireless Commun. Signal Process., Oct. 2015, pp. 15-17.
-
(2015)
Proc. Int. Conf. Wireless Commun. Signal Process.
, pp. 15-17
-
-
Duan, B.1
Cai, Y.2
Zheng, J.3
Yang, W.4
-
34
-
-
79960596603
-
Improve physical layer security in cooperative wireless network using distributed auction games
-
Apr.
-
R. Zhang, L. Song, Z. Han, and B. Jiao, "Improve physical layer security in cooperative wireless network using distributed auction games, " in Proc. IEEE Conf. Comput. Commun. Workshops, Apr. 2011, pp. 18-23.
-
(2011)
Proc. IEEE Conf. Comput. Commun. Workshops
, pp. 18-23
-
-
Zhang, R.1
Song, L.2
Han, Z.3
Jiao, B.4
|