Two-step transmission with artificial noise for secure wireless SIMO communications
暂无分享,去创建一个
[1] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[2] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[3] Xiaohua Li,et al. Array Redundancy and Diversity for Wireless Transmissions with Low Probability of Interception , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[4] Di Zhao,et al. Ergodic secrecy rate of two-user MISO interference channels with statistical CSI , 2014, Science China Information Sciences.
[5] Are Hjørungnes. Complex-Valued Matrix Derivatives: Preface , 2011 .
[6] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[7] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[8] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[9] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[10] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[11] Anelia Somekh-Baruch,et al. On Gaussian wiretap channels with M-PAM inputs , 2010, 2010 European Wireless Conference (EW).
[12] Hon Tat Hui,et al. Multi-Cell Random Beamforming: Achievable Rate and Degrees of Freedom Region , 2012, IEEE Transactions on Signal Processing.
[13] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[14] Tao Jiang,et al. Secure Space-Time Communications Over Rayleigh Flat Fading Channels , 2016, IEEE Transactions on Wireless Communications.
[15] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[16] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[17] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[18] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[19] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[20] Huiming Wang,et al. Improving the secrecy rate of wireless SIMO systems via two-step transmission , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[21] J. Geist. Capacity and cutoff rate for dense M-ary PSK constellations , 1990, IEEE Conference on Military Communications.
[22] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[23] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[24] Yahong Rosa Zheng,et al. On the Mutual Information and Power Allocation for Vector Gaussian Channels with Finite Discrete Inputs , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.