Ergodic Secrecy Rate of Randomly Deployed Cellular Networks Enhanced by Artificial Noise
暂无分享,去创建一个
Zhu Han | Hui Chen | Xiaofeng Tao | Na Li | Zhu Han | Na Li | Xiaofeng Tao | Hui Chen
[1] Steven W. Nydick,et al. The Wishart and Inverse Wishart Distributions , 2012 .
[2] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[3] François Baccelli,et al. Stochastic geometry and wireless networks , 2009 .
[4] Hui Chen,et al. Secrecy performance of the artificial noise assisted broadcast channel with confidential messages and external eavesdroppers , 2016, 2016 IEEE International Conference on Communications (ICC).
[5] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[6] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[7] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[8] Thomas L. Marzetta,et al. Pilot Contamination and Precoding in Multi-Cell TDD Systems , 2009, IEEE Transactions on Wireless Communications.
[9] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[10] Qimei Cui,et al. Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.
[11] Antonia Maria Tulino,et al. Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.
[12] Jeffrey G. Andrews,et al. Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.
[13] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[14] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[15] Jeffrey G. Andrews,et al. Modeling and Analysis of K-Tier Downlink Heterogeneous Cellular Networks , 2011, IEEE Journal on Selected Areas in Communications.
[16] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.
[17] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[18] Massimo Franceschetti,et al. Random networks for communication : from statistical physics to information systems , 2008 .