Secure transmission in multiuser peer-to-peer relay network with finite alphabet input
暂无分享,去创建一个
[1] Xiangyun Zhou,et al. When Does Relay Transmission Give a More Secure Connection in Wireless Ad Hoc Networks? , 2014, IEEE Transactions on Information Forensics and Security.
[2] Daniel Pérez Palomar,et al. Gradient of mutual information in linear vector Gaussian channels , 2005, ISIT.
[3] Zhi Ding,et al. Globally Optimal Linear Precoders for Finite Alphabet Signals Over Complex Vector Gaussian Channels , 2011, IEEE Transactions on Signal Processing.
[4] Zhi Ding,et al. On the Secrecy Rate of Multi-Antenna Wiretap Channel under Finite-Alphabet Input , 2011, IEEE Communications Letters.
[5] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[6] Mingxi Wang,et al. Linear Precoding for MIMO Multiple Access Channels with Finite Discrete Inputs , 2011, IEEE Transactions on Wireless Communications.
[7] Victor C. M. Leung,et al. Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.
[8] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.
[9] Zhi Ding,et al. Cooperative Multi-Cell MIMO Downlink Precoding With Finite-Alphabet Inputs , 2015, IEEE Trans. Commun..
[10] Derrick Wing Kwan Ng,et al. Joint Beamforming and Power Allocation for Secrecy in Peer-to-Peer Relay Networks , 2015, IEEE Transactions on Wireless Communications.
[11] Hang Long,et al. Secure communication design for multi-user peer-to-peer wireless relay networks , 2016, IET Commun..
[12] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[13] Yahong Rosa Zheng,et al. On the Mutual Information and Power Allocation for Vector Gaussian Channels with Finite Discrete Inputs , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[14] Yong Cheng,et al. Joint Optimization of Source Power Allocation and Distributed Relay Beamforming in Multiuser Peer-to-Peer Relay Networks , 2012, IEEE Transactions on Signal Processing.
[15] Björn E. Ottersten,et al. Using simple relays to improve physical-layer security , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).
[16] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[17] Yueming Cai,et al. Increasing secrecy capacity via joint design of cooperative beamforming and jamming , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[18] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[19] Zhi Ding,et al. Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.
[20] Yang Li,et al. 3D channel model in 3GPP , 2015, IEEE Communications Magazine.
[21] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[22] Zhi Ding,et al. Linear Precoding for MIMO Broadcast Channels With Finite-Alphabet Constraints , 2012, IEEE Transactions on Wireless Communications.
[23] Xuelong Li,et al. Relay selection for wireless communications against eavesdropping: a security-reliability trade-off perspective , 2016, IEEE Network.
[24] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[25] Saeed Gazor,et al. Multiple Peer-to-Peer Communications Using a Network of Relays , 2009, IEEE Transactions on Signal Processing.
[26] Ananthanarayanan Chockalingam,et al. Decode-and-Forward Relay Beamforming for Secrecy with Finite-Alphabet Input , 2013, IEEE Communications Letters.
[27] Michele Nogueira Lima,et al. Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.
[28] Are Hjørungnes,et al. Complex-Valued Matrix Differentiation: Techniques and Key Results , 2007, IEEE Transactions on Signal Processing.