Secrecy performance analysis of hybrid eavesdroppers system using stochastic geometry and random matrix theory
暂无分享,去创建一个
Zhu Han | Hui Chen | Xiaofeng Tao | Na Li
[1] Jeffrey G. Andrews,et al. Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Mérouane Debbah,et al. Large System Analysis of Linear Precoding in Correlated MISO Broadcast Channels Under Limited Feedback , 2009, IEEE Transactions on Information Theory.
[4] Hui Chen,et al. Secrecy performance of the artificial noise assisted broadcast channel with confidential messages and external eavesdroppers , 2016, 2016 IEEE International Conference on Communications (ICC).
[5] Jamie S. Evans,et al. Multiuser Transmit Beamforming via Regularized Channel Inversion: A Large System Analysis , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[8] A. Lee Swindlehurst,et al. A vector-perturbation technique for near-capacity multiantenna multiuser communication-part II: perturbation , 2005, IEEE Transactions on Communications.
[9] Qimei Cui,et al. Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.
[10] Jeffrey G. Andrews,et al. What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.
[11] Prabhata K. Swamee,et al. Near Lognormal Distribution , 2002 .
[12] D. Stoyan,et al. Stochastic Geometry and Its Applications , 1989 .
[13] A. Lozano,et al. What Will 5 G Be ? , 2014 .
[14] Jeffrey G. Andrews,et al. Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[15] Zhu Han,et al. Combating full-duplex active eavesdropper: A game-theoretic perspective , 2016, 2016 IEEE International Conference on Communications (ICC).
[16] Can Emre Koksal,et al. On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary , 2013, IEEE Transactions on Information Theory.
[17] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[18] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[19] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[20] Antonia Maria Tulino,et al. Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.
[21] Geoffrey G. Messier,et al. Opportunistic Transmission using Large Scale Channel Effects , 2010, IEEE Transactions on Communications.