MIMO Secret Communications Against an Active Eavesdropper
暂无分享,去创建一个
[1] James S. Lehnert,et al. Optimal cooperative jamming for security , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[2] Andrey Garnaev,et al. To Eavesdrop or Jam, That is the Question , 2013, ADHOCNETS.
[3] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[4] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[5] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[6] H. Vincent Poor,et al. On unbounded path-loss models: effects of singularity on wireless network performance , 2009, IEEE Journal on Selected Areas in Communications.
[7] A. Lee Swindlehurst,et al. Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[8] Mohammad Reza Javan. Guaranteeing secure communication in OFDM network with an active eavesdropper , 2014, 7'th International Symposium on Telecommunications (IST'2014).
[9] Zhi Chen,et al. A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.
[10] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[11] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[12] Risto Wichman,et al. In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.
[13] Jianwei Xie,et al. Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.
[14] Aylin Yener,et al. Secure degrees of freedom of N ×N ×M wiretap channel with a K-antenna cooperative jammer , 2015, 2015 IEEE International Conference on Communications (ICC).
[15] Sennur Ulukus,et al. Secrecy in broadcast channel with combating helpers and interference channel with selfish users , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[16] Zhi Chen,et al. Secrecy degrees of freedom of a MIMO Gaussian wiretap channel with a cooperative jammer , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[17] Derrick Wing Kwan Ng,et al. Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.
[18] George T. Amariucai,et al. Half-Duplex Active Eavesdropping in Fast-Fading Channels: A Block-Markov Wyner Secrecy Encoding Scheme , 2012, IEEE Transactions on Information Theory.
[19] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[20] Shlomo Shamai,et al. Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[21] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[22] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[23] Jeffrey G. Andrews,et al. MIMO Interference Alignment Over Correlated Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[24] Sennur Ulukus,et al. Achievable secrecy rates in the multiple access wiretap channel with deviating users , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[25] Derrick Wing Kwan Ng,et al. Secure Massive MIMO transmission in the presence of an active eavesdropper , 2015, 2015 IEEE International Conference on Communications (ICC).
[26] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[27] Vijay K. Bhargava,et al. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.
[28] A. Lee Swindlehurst,et al. A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[29] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[30] Jianwei Xie,et al. Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure , 2014, IEEE Transactions on Information Theory.
[31] Athina P. Petropulu,et al. Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[32] Wan Choi,et al. Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law , 2014, IEEE Transactions on Signal Processing.
[33] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[34] H. Vincent Poor,et al. A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes , 2016, IEEE Transactions on Wireless Communications.
[35] Zhi Chen,et al. Improving Wireless Physical Layer Security via Exploiting Co-Channel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[36] A. Lee Swindlehurst,et al. Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.
[37] Walid Saad,et al. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[38] Azzam Al-Nahari,et al. Physical layer security using massive multiple-input and multiple-output: passive and active eavesdroppers , 2016, IET Commun..
[39] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[40] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[41] Elza Erkip,et al. A Secure Communication Game With a Relay Helping the Eavesdropper , 2009, IEEE Transactions on Information Forensics and Security.
[42] Aylin Yener,et al. Secure degrees of freedom for the MIMO wiretap channel with a multiantenna cooperative jammer , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[43] Zhu Han,et al. Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.
[44] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[45] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[46] Athina P. Petropulu,et al. Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.