Joint power and beam optimization in a multi-carrier MIMO wiretap channel with Full-Duplex jammer
暂无分享,去创建一个
[1] Zhi Chen,et al. A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.
[2] A. Lee Swindlehurst,et al. A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[3] Derrick Wing Kwan Ng,et al. Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.
[4] Philip Schniter,et al. Full-Duplex Bidirectional MIMO: Achievable Rates Under Limited Dynamic Range , 2012, IEEE Transactions on Signal Processing.
[5] Eduard A. Jorswieck,et al. Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Stephen P. Boyd,et al. Determinant Maximization with Linear Matrix Inequality Constraints , 1998, SIAM J. Matrix Anal. Appl..
[8] Tho Le-Ngoc,et al. Full-duplex relay with jamming protocol for improving physical-layer security , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[9] Sachin Katti,et al. Full duplex radios , 2013, SIGCOMM.
[10] K. Schittkowski,et al. NONLINEAR PROGRAMMING , 2022 .
[11] Ashutosh Sabharwal,et al. Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.
[12] H. Vincent Poor,et al. Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.
[13] Halim Yanikomeroglu,et al. Secure Robust Resource Allocation in the Presence of Active Eavesdroppers Using Full-Duplex Receivers , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).
[14] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[15] Ananthanarayanan Chockalingam,et al. Sum Secrecy Rate in MISO Full-Duplex Wiretap Channel with Imperfect CSI , 2013, 2015 IEEE Globecom Workshops (GC Wkshps).
[17] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[18] N. K. Shankaranarayanan,et al. Full- or half-duplex? A capacity analysis with bounded radio resources , 2012, 2012 IEEE Information Theory Workshop.
[19] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[20] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.
[21] Il-Min Kim,et al. Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.
[22] Risto Wichman,et al. In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.
[23] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[24] Chong-Yung Chi,et al. Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.
[25] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[26] Yiming Ma,et al. A Method for Broadband Full-Duplex MIMO Radio , 2012, IEEE Signal Processing Letters.
[27] Zhi Xue,et al. Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization , 2014, IEEE Signal Processing Letters.
[28] Narayan Prasad,et al. On Robust Weighted-Sum Rate Maximization in MIMO Interference Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[29] Philip Levis,et al. Applications of self-interference cancellation in 5G and beyond , 2014, IEEE Communications Magazine.
[30] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[31] Sachin Katti,et al. Full Duplex MIMO Radios , 2014, NSDI.
[32] Philip Levis,et al. Practical, real-time, full duplex wireless , 2011, MobiCom.
[33] Guo Fei,et al. Secure power and subcarrier auction in uplink full-duplex cellular networks , 2015, China Communications.