Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter
暂无分享,去创建一个
Matti Latva-aho | Hirley Alves | Carlos H. M. de Lima | Pedro Henrique Juliano Nardelli | Mauricio de Castro Tomé | P. Nardelli | M. Latva-aho | H. Alves | C. Lima | M. C. Tomé
[1] Branka Vucetic,et al. Error performance of maximal-ratio combining with transmit antenna selection in flat Nakagami-m fading channels , 2006, IEEE Transactions on Wireless Communications.
[2] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[3] J. Zico Kolter,et al. REDD : A Public Data Set for Energy Disaggregation Research , 2011 .
[4] Ruoheng Liu,et al. On the Achievable Secrecy Throughput of Block Fading Channels with No Channel State Information at Transmitter , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[5] Goran Strbac,et al. Demand side management: Benefits and challenges ☆ , 2008 .
[6] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.
[7] Matti Latva-aho,et al. Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter , 2015, IEEE Transactions on Communications.
[8] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[9] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[10] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[11] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[12] Saifur Rahman,et al. Communication network requirements for major smart grid applications in HAN, NAN and WAN , 2014, Comput. Networks.
[13] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[14] Matti Latva-aho,et al. Optimal Transmission Capacity of Ad Hoc Networks with Packet Retransmissions , 2012, IEEE Transactions on Wireless Communications.
[15] Mario Gerla,et al. Physical layer security in wireless smart grid , 2012, IEEE Communications Magazine.
[16] Trung Quang Duong,et al. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[17] Husheng Li,et al. Gathering Process Data in Low-Voltage Systems by Enhanced Event-Driven Metering , 2017, IEEE Systems Journal.
[18] Hirley Alves,et al. Enhanced physical layer security through transmit antenna selection , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[19] Matti Latva-aho,et al. On the Performance of Secure Full-Duplex Relaying under Composite Fading Channels , 2015, IEEE Signal Processing Letters.
[20] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[21] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[22] Naima Kaabouch,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[23] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[24] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[25] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[26] Jing Huang,et al. Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.
[27] Ronald F. Boisvert,et al. NIST Handbook of Mathematical Functions , 2010 .
[28] Matti Latva-aho,et al. Models for the modern power grid , 2013, 1401.0260.
[29] Xiangyun Zhou,et al. On Secrecy Metrics for Physical Layer Security Over Quasi-Static Fading Channels , 2016, IEEE Transactions on Wireless Communications.
[30] Lazaros Gkatzikis,et al. The Role of Aggregators in Smart Grid Demand Response Markets , 2013, IEEE Journal on Selected Areas in Communications.
[31] Matti Latva-aho,et al. Joint sampling-communication strategies for smart-meters to aggregator link as secondary users , 2016, 2016 IEEE International Energy Conference (ENERGYCON).
[32] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[33] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[34] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[35] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[36] A. G. Greenhill,et al. Handbook of Mathematical Functions with Formulas, Graphs, , 1971 .
[37] Hirley Alves,et al. Throughput performance of parallel and repetition coding in incremental decode-and-forward relaying , 2012, Wirel. Networks.
[38] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.