Dirty-Paper Coding Based Secure Transmission for Multiuser Downlink in Cellular Communication Systems
暂无分享,去创建一个
[1] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[2] Shlomo Shamai,et al. The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.
[3] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[4] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[5] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[6] Hsiao-Hwa Chen,et al. Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI—A Unified Secrecy Performance Analysis , 2014, IEEE Transactions on Signal Processing.
[7] Jeffrey G. Andrews,et al. Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[8] Qiang Li,et al. A Safe Approximation Approach to Secrecy Outage Design for MIMO Wiretap Channels , 2014, IEEE Signal Processing Letters.
[9] Donald F. Towsley,et al. Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.
[10] Abraham Charnes,et al. Programming with linear fractional functionals , 1962 .
[11] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[12] Chong-Yung Chi,et al. Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.
[13] Qiang Li,et al. Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[14] Derrick Wing Kwan Ng,et al. Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.
[15] Chong-Yung Chi,et al. Probabilistic SINR constrained robust transmit beamforming: A Bernstein-type inequality based conservative approach , 2010, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[16] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[17] I. Bechar,et al. A Bernstein-type inequality for stochastic processes of quadratic forms of Gaussian variables , 2009, 0909.3595.
[18] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[19] Bo Wang,et al. Optimal Semiadaptive Transmission With Artificial-Noise-Aided Beamforming in MISO Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[20] Bo Wang,et al. Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint , 2015, IEEE Communications Letters.
[21] Huiming Wang,et al. Combining dirty-paper coding and artificial noise for secrecy , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[22] Huiming Wang,et al. Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.
[23] Bo Wang,et al. Practical Transmission Scheme With Fixed Communication Rate Under Constraints of Transmit Power and Secrecy Outage Probability , 2015, IEEE Communications Letters.
[24] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[25] Amir K. Khandani,et al. The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel , 2009, IEEE Transactions on Information Theory.
[26] Shi Jin,et al. Ergodic Secrecy Sum-Rate for Multiuser Downlink Transmission via Regularized Channel Inversion: Large System Analysis , 2014, IEEE Communications Letters.
[27] M. B. Shenouda,et al. Probabilistically-constrained approaches to the design of the multiple antenna downlink , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.
[28] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[29] Shuai Ma,et al. Outage Constrained Robust Secure Transmission for MISO Wiretap Channels , 2013, IEEE Transactions on Wireless Communications.
[30] Shlomo Shamai,et al. On the Achievable Throughput of a Multiantenna , 2003 .
[31] Markku J. Juntti,et al. On Linear Precoding Strategies for Secrecy Rate Maximization in Multiuser Multiantenna Wireless Networks , 2014, IEEE Transactions on Signal Processing.
[32] Tareq Y. Al-Naffouri,et al. On the Distribution of Indefinite Quadratic Forms in Gaussian Random Variables , 2009, IEEE Transactions on Communications.
[33] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[34] Jinhong Yuan,et al. Confidential Broadcasting via Linear Precoding in Non-Homogeneous MIMO Multiuser Networks , 2014, IEEE Transactions on Communications.
[35] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[36] Wan Choi,et al. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.
[37] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[38] Iain B. Collings,et al. Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.
[39] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[40] M. V. Clark,et al. Theoretical reliability of MMSE linear diversity combining in Rayleigh-fading additive interference channels , 1998, IEEE Trans. Commun..
[41] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.