Secure Degrees of Freedom of Rank-Deficient BCCM and Rank-Deficient ICCM
暂无分享,去创建一个
[1] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[2] Aylin Yener,et al. Secure Degrees of Freedom for the MIMO Wire-Tap Channel With a Multi-Antenna Cooperative Jammer , 2015, IEEE Trans. Inf. Theory.
[3] Jianwei Xie,et al. Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure , 2014, IEEE Transactions on Information Theory.
[4] Jianwei Xie,et al. Secure degrees of freedom of the Gaussian wiretap channel with helpers , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[5] Sennur Ulukus,et al. Secure Degrees of Freedom Region of Static and Time-Varying Gaussian MIMO Interference Channel , 2019, IEEE Transactions on Information Theory.
[6] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[7] Qiang Wang,et al. Secure Degrees of Freedom of the Asymmetric Gaussian MIMO Interference Channel , 2017, IEEE Transactions on Vehicular Technology.
[8] Mahesh K. Varanasi,et al. Degrees of Freedom of the MIMO Z-Interference Channel With Delayed CSIT , 2015, IEEE Communications Letters.
[9] Shlomo Shamai,et al. Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.
[10] Vahid Tarokh,et al. On the degrees-of-freedom of the MIMO interference channel , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[11] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[12] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[13] Bin Dai,et al. Feedback Coding Schemes for the Broadcast Channel With Mutual Secrecy Requirement at the Receivers , 2019, IEEE Transactions on Communications.
[14] Fuhui Zhou,et al. Robust Chance-Constrained Secure Transmission for Cognitive Satellite–Terrestrial Networks , 2018, IEEE Transactions on Vehicular Technology.
[15] Yuan Luo,et al. An Improved Feedback Coding Scheme for the Wire-Tap Channel , 2019, IEEE Transactions on Information Forensics and Security.
[16] Xiaoli Xu,et al. On the degrees of freedom of the 3-user rank-deficient MIMO interference channels , 2013, 2013 IEEE International Conference on Communications (ICC).
[17] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[18] Yan Zhang,et al. Physical-Layer Security in Space Information Networks: A Survey , 2020, IEEE Internet of Things Journal.
[19] Sergey Loyka,et al. From Multi-Keyholes to Measure of Correlation and Power Imbalance in MIMO Channels: Outage Capacity Analysis , 2008, IEEE Transactions on Information Theory.
[20] Sundar R. Krishnamurthy,et al. Degrees of Freedom of Rank-Deficient MIMO Interference Channels , 2015, IEEE Transactions on Information Theory.
[21] Qiang Wang,et al. Secure Degrees of Freedom of Rank-Deficient MIMO Interference Channel , 2019, IEEE Communications Letters.
[22] Jianwei Xie,et al. Secure Degrees of Freedom of $K$ -User Gaussian Interference Channels: A Unified View , 2013, IEEE Transactions on Information Theory.
[23] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.