On optimal artificial-noise assisted secure beamforming for the fading eavesdropper channel
暂无分享,去创建一个
Hsuan-Jung Su | Shih-Chun Lin | Pin-Hsun Lin | Szu-Hsiang Lai | Pin-Hsun Lin | Szu-Hsiang Lai | Shih-Chun Lin | Hsuan-Jung Su
[1] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[2] Athina P. Petropulu,et al. On Ergodic Secrecy Capacity for Gaussian MISO Wiretap Channels , 2010, ArXiv.
[3] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[4] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[5] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[6] Roy D. Yates,et al. Secret Communication with a Fading Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Eduard A. Jorswieck,et al. Beamforming for fading wiretap channels with partial channel information , 2010, 2010 International ITG Workshop on Smart Antennas (WSA).
[9] Jeffrey G. Andrews,et al. Secure Wireless Network Connectivity with Multi-Antenna Transmission , 2011, IEEE Transactions on Wireless Communications.
[10] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[11] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[12] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[13] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[14] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[15] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[16] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[17] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.