Secure Internet-of-Things Communications: Joint Precoding and Power Control
暂无分享,去创建一个
[1] Jinseok Choi,et al. MIMO Design for Internet of Things: Joint Optimization of Spectral Efficiency and Error Probability in Finite Blocklength Regime , 2021, IEEE Internet of Things Journal.
[2] Chen Feng,et al. Secure Short-Packet Communications at the Physical Layer for 5G and Beyond , 2021, IEEE Communications Standards Magazine.
[3] Bingli Jiao,et al. Secrecy Throughput in Full-Duplex Multiuser MIMO Short-Packet Communications , 2021, IEEE Wireless Communications Letters.
[4] Yansha Deng,et al. Resource Allocation for Secure URLLC in Mission-Critical IoT Scenarios , 2019, IEEE Transactions on Communications.
[5] Vahid Jamali,et al. Resource Allocation for Multi-User Downlink MISO OFDMA-URLLC Systems , 2019, IEEE Transactions on Communications.
[6] Xianbin Wang,et al. Secure Transmission via Joint Precoding Optimization for Downlink MISO NOMA , 2019, IEEE Transactions on Vehicular Technology.
[7] Alireza Ghasempour,et al. Internet of Things in Smart Grid: Architecture, Applications, Services, Key Technologies, and Challenges , 2019, Inventions.
[8] H. Vincent Poor,et al. Secure Short-Packet Communications for Mission-Critical IoT Applications , 2019, IEEE Transactions on Wireless Communications.
[9] Giuseppe Caire,et al. Joint User Selection, Power Allocation, and Precoding Design With Imperfect CSIT for Multi-Cell MU-MIMO Downlink Systems , 2019, IEEE Transactions on Wireless Communications.
[10] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[11] Mikael Skoglund,et al. Delay Performance of the Multiuser MISO Downlink Under Imperfect CSI and Finite-Length Coding , 2018, IEEE Journal on Selected Areas in Communications.
[12] Qian Liu,et al. Secure Beamformer Designs in MU-MIMO Systems With Multiuser Interference Exploitation , 2018, IEEE Transactions on Vehicular Technology.
[13] Babak D. Beheshti,et al. A survey of cryptographic algorithms for IoT devices , 2018, 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[14] Li Sun,et al. Physical layer security with its applications in 5G networks: A review , 2017, China Communications.
[15] H. Vincent Poor,et al. Wiretap Channels: Nonasymptotic Fundamental Limits , 2017, IEEE Transactions on Information Theory.
[16] Andreas Mitschele-Thiel,et al. Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture , 2017, IEEE Communications Magazine.
[17] H. Vincent Poor,et al. Finite-blocklength bounds for wiretap channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[18] Abdelmadjid Bouabdallah,et al. M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.
[19] Vincent Y. F. Tan,et al. The dispersion of nearest-neighbor decoding for additive non-Gaussian channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[20] Petar Popovski,et al. Towards Massive, Ultra-Reliable, and Low-Latency Wireless Communication with Short Packets , 2015 .
[21] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[22] Giuseppe Durisi,et al. Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength , 2013, IEEE Transactions on Information Theory.
[23] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[24] Giuseppe Caire,et al. Joint Spatial Division and Multiplexing—The Large-Scale Array Regime , 2012, IEEE Transactions on Information Theory.
[25] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[26] S. Verdú,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.