On Quantization for Masked Beamforming Secrecy Systems
暂无分享,去创建一个
[1] Bhaskar D. Rao,et al. Transmit beamforming in multiple-antenna systems with finite rate feedback: a VQ-based approach , 2006, IEEE Transactions on Information Theory.
[2] Zhi Ding,et al. On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.
[3] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[4] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[5] B. Arnold,et al. A first course in order statistics , 1994 .
[6] Chong-Yung Chi,et al. On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2011, IEEE Trans. Wirel. Commun..
[7] A. Paulraj,et al. A simple scheme for transmit diversity using partial channel feedback , 1998, Conference Record of Thirty-Second Asilomar Conference on Signals, Systems and Computers (Cat. No.98CH36284).
[8] H. Vincent Poor,et al. Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.
[9] Joseph Lipka,et al. A Table of Integrals , 2010 .
[10] A. Lee Swindlehurst,et al. Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.
[11] Andrea J. Goldsmith,et al. Multi-Antenna Downlink Channels with Limited Feedback and User Selection , 2007, IEEE Journal on Selected Areas in Communications.
[12] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[13] D. Rajan. Probability, Random Variables, and Stochastic Processes , 2017 .
[14] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[15] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[16] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[17] Babak Hassibi,et al. On the capacity of MIMO broadcast channels with partial side information , 2005, IEEE Transactions on Information Theory.
[18] Robert W. Heath,et al. Grassmannian beamforming for multiple-input multiple-output wireless systems , 2003, IEEE Trans. Inf. Theory.
[19] A. James. Distributions of Matrix Variates and Latent Roots Derived from Normal Samples , 1964 .
[20] Nihar Jindal,et al. Multi-Antenna Broadcast Channels with Limited Feedback and User Selection , 2006 .
[21] Nihar Jindal. MIMO broadcast channels with finite rate feedback , 2005, GLOBECOM.
[22] Qiang Li,et al. A robust artificial noise aided transmit design for MISO secrecy , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[23] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[24] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[25] A. Lee Swindlehurst,et al. MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.
[26] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[27] David James Love,et al. On the performance of random vector quantization limited feedback beamforming in a MISO system , 2007, IEEE Transactions on Wireless Communications.
[28] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .
[29] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[30] Ya-Feng Liu,et al. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.
[31] Thomas M. Cover,et al. Network Information Theory , 2001 .
[32] B. Arnold,et al. A first course in order statistics , 2008 .
[33] A. M. Mathai. Quadratic forms in random variables , 1992 .
[34] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.
[35] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[36] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[37] Arjun K. Gupta,et al. Handbook of beta distribution and its applications , 2004 .
[38] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[39] Mounir Ghogho,et al. Physical layer security by robust masked beamforming and protected zone optimisation , 2014, IET Commun..