-
1
-
-
84963759082
-
What is lifi?
-
Mar. 15
-
H. Haas, L. Yin, Y. Wang, and C. Chen, "What is LiFi?" J. Lightw. Technol., vol. 34, no. 6, pp. 1533-1544, Mar. 15, 2016.
-
(2016)
J. Lightw. Technol
, vol.34
, Issue.6
, pp. 1533-1544
-
-
Haas, H.1
Yin, L.2
Wang, Y.3
Chen, C.4
-
3
-
-
84940056690
-
Physical-layer security for MISO visible light communication channels
-
Sep
-
A. Mostafa and L. Lampe, "Physical-layer security for MISO visible light communication channels, " IEEE J. Sel. Areas Commun., vol. 33, no. 9, pp. 1806-1818, Sep. 2015.
-
(2015)
IEEE J. Sel. Areas Commun
, vol.33
, Issue.9
, pp. 1806-1818
-
-
Mostafa, A.1
Lampe, L.2
-
4
-
-
85015395695
-
On the secrecy capacity of MISO visible light communication channels
-
Washington, DC, USA, Dec
-
M. A. Arfaoui, Z. Rezki, A. Ghrayeb, and M. S. Alouini, "On the secrecy capacity of MISO visible light communication channels, " in Proc. IEEE Globecom, Washington, DC, USA, Dec. 2016, pp. 1-7.
-
(2016)
Proc IEEE Globecom
, pp. 1-7
-
-
Arfaoui, M.A.1
Rezki, Z.2
Ghrayeb, A.3
Alouini, M.S.4
-
5
-
-
85026192803
-
Secrecy analysis in visible light communication systems with randomly located eavesdroppers
-
Paris, France, May
-
S. Cho, G. Chen, and J. P. Coon, "Secrecy analysis in visible light communication systems with randomly located eavesdroppers, " in Proc. IEEE ICC, Paris, France, May 2017, pp. 475-480.
-
(2017)
Proc IEEE ICC
, pp. 475-480
-
-
Cho, S.1
Chen, G.2
Coon, J.P.3
-
6
-
-
85035788828
-
Physical-layer security in multiuser visible light communication networks
-
Jan
-
L. Yin and H. Haas, "Physical-layer security in multiuser visible light communication networks, " IEEE J. Sel. Areas Commun., vol. 36, no. 1, pp. 162-174, Jan. 2018.
-
(2018)
IEEE J. Sel. Areas Commun
, vol.36
, Issue.1
, pp. 162-174
-
-
Yin, L.1
Haas, H.2
-
7
-
-
70449514539
-
Wireless physical-layer security: The case of colluding eavesdroppers
-
Seoul, South Korea, Jun
-
P. C. Pinto, J. Barros, and M. Z. Win, "Wireless physical-layer security: The case of colluding eavesdroppers, " in Proc. IEEE ISIT, Seoul, South Korea, Jun. 2009, pp. 2442-2446.
-
(2009)
Proc IEEE ISIT
, pp. 2442-2446
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
8
-
-
84855911932
-
Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion
-
Feb
-
P. C. Pinto, J. Barros, andM. Z.Win, "Secure communication in stochastic wireless networks-Part II: Maximum rate and collusion, " IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 139-147, Feb. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.1
, pp. 139-147
-
-
Pinto, P.C.1
Barros, J.2
Win, M.Z.3
-
9
-
-
85014220673
-
Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers
-
May
-
G. Chen, J. P. Coon, and M. D. Renzo, "Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers, " IEEE Trans. Inf. Forensics Security, vol. 12, no. 5, pp. 1195-1206, May 2017.
-
(2017)
IEEE Trans. Inf. Forensics Security
, vol.12
, Issue.5
, pp. 1195-1206
-
-
Chen, G.1
Coon, J.P.2
Renzo, M.D.3
-
10
-
-
85041932786
-
Numerical inversion of a characteristic function
-
R. B. Davies, "Numerical inversion of a characteristic function, " Biometrika, vol. 60, no. 2, pp. 415-417, 1973.
-
(1973)
Biometrika
, vol.60
, Issue.2
, pp. 415-417
-
-
Davies, R.B.1
-
11
-
-
84946688995
-
Optimum diversity combining techniques for visible light communication systems
-
Austin, TX, USA Dec
-
A. Tsiatmas, F. M. J. Willems, and S. Baggen, "Optimum diversity combining techniques for visible light communication systems, " in Proc. IEEE Globecom, Austin, TX, USA, Dec. 2014, pp. 456-461.
-
(2014)
Proc IEEE Globecom
, pp. 456-461
-
-
Tsiatmas, A.1
Willems, F.M.J.2
Baggen, S.3
-
12
-
-
1942487834
-
Fundamental analysis for visiblelight communication system using LED lights
-
Feb
-
T. Komine and M. Nakagawa, "Fundamental analysis for visiblelight communication system using LED lights, " IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 100-107, Feb. 2004.
-
(2004)
IEEE Trans. Consum. Electron
, vol.50
, Issue.1
, pp. 100-107
-
-
Komine, T.1
Nakagawa, M.2
-
13
-
-
84873177435
-
Gaussian wiretap channel with an amplitude constraint
-
Lausanne, Switzerland Sep
-
O. Ozel, E. Ekrem, and S. Ulukus, "Gaussian wiretap channel with an amplitude constraint, " in Proc. IEEE ITW, Lausanne, Switzerland, Sep. 2012, pp. 139-143.
-
(2012)
Proc IEEE ITW
, pp. 139-143
-
-
Ozel, O.1
Ekrem, E.2
Ulukus, S.3
-
14
-
-
84983462185
-
-
Wiley Series in Probability and Statistics), 3rd ed. Hoboken, NJ, USA: Wiley
-
S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Geometry and Its Applications (Wiley Series in Probability and Statistics), 3rd ed. Hoboken, NJ, USA: Wiley, 2013.
-
(2013)
Stochastic Geometry and Its Applications
-
-
Chiu, S.N.1
Stoyan, D.2
Kendall, W.S.3
Mecke, J.4
-
15
-
-
0003498504
-
-
Amsterdam, The Netherlands, Academic Press
-
I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. Amsterdam, The Netherlands: Academic Press, 2007.
-
(2007)
Table of Integrals, Series, and Products, 7th Ed.
-
-
Gradshteyn, I.S.1
Ryzhik, I.M.2
|