Advanced Properties of Full-Duplex Radio for Securing Wireless Network
暂无分享,去创建一个
[1] Taneli Riihonen,et al. Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.
[2] Lei Chen,et al. Fast Power Allocation for Secure Communication With Full-Duplex Radio , 2017, IEEE Transactions on Signal Processing.
[3] Yiming Ma,et al. A Method for Broadband Full-Duplex MIMO Radio , 2012, IEEE Signal Processing Letters.
[4] Daniel J. Ryan,et al. Blind detection of PAM and QAM in fading channels , 2006, IEEE Transactions on Information Theory.
[5] Zhu Han,et al. Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy , 2017, IEEE Transactions on Wireless Communications.
[6] Bin Zhao,et al. A distributed medium access control scheme for a large network of wireless routers , 2008, IEEE Transactions on Wireless Communications.
[7] Nader Mokari,et al. How to manage resources to provide physical layer security: Active versus passive adversary? , 2018, Phys. Commun..
[8] Yu Gong,et al. Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.
[9] Yingbo Hua,et al. Previously Published Works Uc Riverside Title: Fast Maximum Likelihood for Blind Identification of Multiple Fir Channels Fast Maximum Likelihood for Blind Identification of Multiple Fir Channels , 2022 .
[10] Yifan Li,et al. Radio self-interference cancellation by transmit beamforming, all-analog cancellation and blind digital tuning , 2015, Signal Process..
[11] Pierre Hansen,et al. A note on diameters of point sets , 2009, Optim. Lett..
[12] Chong-Yung Chi,et al. Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems , 2010, IEEE Transactions on Signal Processing.
[13] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[14] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[15] Yingbo Hua,et al. Strict identifiability of multiple FIR channels driven by an unknown arbitrary sequence , 1996, IEEE Trans. Signal Process..
[16] Qian Yang,et al. Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers , 2016, IEEE Transactions on Wireless Communications.
[17] Yingbo Hua,et al. Capacity of Ultra-Wideband Power-Constrained Ad Hoc Networks , 2008, IEEE Transactions on Information Theory.
[18] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[19] Derrick Wing Kwan Ng,et al. Robust and Secure Resource Allocation for Full-Duplex MISO Multicarrier NOMA Systems , 2017, IEEE Transactions on Communications.
[20] Justin P. Coon,et al. Physical Layer Security over OFDM-Based Links: Conjugate-and-Return , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[21] Halim Yanikomeroglu,et al. Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.
[22] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[23] Gil Zussman,et al. 1 Chip 2x the bandwidth , 2016, IEEE Spectrum.
[24] Ahmed M. Eltawil,et al. Full-Duplex Systems Using Multireconfigurable Antennas , 2015, IEEE Transactions on Wireless Communications.
[25] Muriel Médard,et al. The effect upon channel capacity in wireless communications of perfect and imperfect knowledge of the channel , 2000, IEEE Trans. Inf. Theory.
[26] Mary Ann Ingram,et al. Cross-Layer Design for the Physical, MAC, and Link Layer in Wireless Systems , 2009, EURASIP J. Adv. Signal Process..
[27] Nico Temme,et al. The uniform asymptotic expansion of a class of integrals related to cumulative distribution functions , 1981 .
[28] T. Tony Cai,et al. Phase transition in limiting distributions of coherence of high-dimensional random matrices , 2011, J. Multivar. Anal..
[29] Huiming Wang,et al. Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.
[30] Philip Schniter,et al. Full-Duplex Bidirectional MIMO: Achievable Rates Under Limited Dynamic Range , 2012, IEEE Transactions on Signal Processing.
[31] Lei Chen,et al. Optimal power allocation for a full-duplex multicarrier decode-forward relay system with or without direct link , 2017, Signal Process..
[32] Yang-Seok Choi,et al. Simultaneous Transmission and Reception: Algorithm, Design and System Level Performance , 2013, IEEE Transactions on Wireless Communications.
[33] Matti Latva-aho,et al. Precoding for Full Duplex Multiuser MIMO Systems: Spectral and Energy Efficiency Maximization , 2013, IEEE Transactions on Signal Processing.
[34] Marwan Krunz,et al. Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks , 2016, IEEE Transactions on Communications.
[35] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[36] Zhu Han,et al. Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.
[37] Yue Rong,et al. MSE-Based Transceiver Designs for Full-Duplex MIMO Cognitive Radios , 2015, IEEE Transactions on Communications.
[38] Bin Zhao,et al. Further Development of Synchronous Array Method for Ad Hoc Wireless Networks , 2009, EURASIP J. Adv. Signal Process..
[39] Justin P. Coon,et al. Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[40] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[41] Ananthram Swami,et al. Distributed and Cooperative Link Scheduling for Large-Scale Multihop Wireless Networks , 2007, EURASIP J. Wirel. Commun. Netw..
[42] Yingbo Hua,et al. Fundamental Properties of Full-Duplex Radio for Secure Wireless Communications , 2017, ArXiv.
[43] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.