Individual secrecy of fading homogeneous multiple access wiretap channel with successive interference cancellation
暂无分享,去创建一个
Zhen Li | Fan Zhang | Tao Jing | Yan Huo | Kai-Wei Jiang
[1] Zhi Chen,et al. Robust transmit design for secure AF relay networks with imperfect CSI , 2016, EURASIP J. Wirel. Commun. Netw..
[2] Pritam Mukherjee,et al. Secure degrees of freedom of the MIMO multiple access wiretap channel , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.
[3] Li Sun,et al. Physical layer security based on real interference alignment in K-user MIMO Y wiretap channels , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[4] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[5] Paul D. Alexander,et al. List detection for the K-symmetric multiple-access channel , 2005, IEEE Transactions on Information Theory.
[6] Hisham Dahshan,et al. On the secure Degrees of Freedom for the K-user symmetric MIMO Wiretap MAC channel , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[7] Gongpu Wang,et al. Secrecy outage probability analysis of multi-user multi-eavesdropper wireless systems , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).
[8] Qimei Cui,et al. Secure transmission with artificial noise in the multiuser downlink: Secrecy sum-rate and optimal power allocation , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[9] Feifei Gao,et al. Zero-forcing beamforming for physical layer security of energy harvesting wireless communications , 2015, EURASIP Journal on Wireless Communications and Networking.
[10] Anas Chaaban,et al. The MISO wiretap channel with channel uncertainty: Asymptotic perspectives , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[11] Mohamed-Slim Alouini,et al. The MISO Wiretap Channel with Noisy Main Channel Estimation in the High Power Regime , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[12] Wei Wu,et al. Robust secrecy beamforming for wireless information and power transfer in multiuser MISO communication system , 2015, EURASIP J. Wirel. Commun. Netw..
[13] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[14] N. Lebedev,et al. Capacity study of a LEO satellite link with multiple antennas user terminals , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).
[15] Bahareh Akhbari,et al. Imperfect and Perfect Secrecy in Compound Multiple Access Channel With Confidential Message , 2016, IEEE Transactions on Information Forensics and Security.
[16] Zhen Li,et al. ZF-SIC Based Individual Secrecy in SIMO Multiple Access Wiretap Channel , 2017, IEEE Access.
[17] Xiuzhen Cheng,et al. Cooperative jamming for secure communications in MIMO Cooperative Cognitive Radio Networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[18] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[19] Harald Haas,et al. Asilomar Conference on Signals, Systems, and Computers , 2006 .
[20] Pritam Mukherjee,et al. Real interference alignment for the MIMO multiple access wiretap channel , 2016, 2016 IEEE International Conference on Communications (ICC).
[21] Bahareh Akhbari,et al. Multiple access channel with common message and secrecy constraint , 2014, IET Commun..
[22] Trung Quang Duong,et al. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[23] Bin Li,et al. Robust beamforming and cooperative jamming for secure transmission in DF relay systems , 2016, EURASIP J. Wirel. Commun. Netw..
[24] Shihao Yan,et al. Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.
[25] Mounir Ghogho,et al. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.
[26] Mohammad Reza Aref,et al. Lossy transmission of correlated sources over multiple-access wiretap channels , 2015, IET Commun..
[27] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[28] Jianwei Xie,et al. Secure degrees of freedom of the Gaussian multiple access wiretap channel , 2013, 2013 IEEE International Symposium on Information Theory.
[29] Shun Watanabe. 国際会議参加報告:IEEE International Symposium on Information Theory , 2012 .
[30] Bang Chul Jung,et al. On the Multi-User Diversity with Secrecy in Uplink Wiretap Networks , 2013, IEEE Communications Letters.
[31] Zhen Li,et al. Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[32] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[33] Sirin Nitinawarat,et al. On maximal error capacity regions of Symmetric Gaussian Multiple-Access Channels , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[34] Sennur Ulukus,et al. Polar Coding for the General Wiretap Channel With Extensions to Multiuser Scenarios , 2016, IEEE Journal on Selected Areas in Communications.
[35] Moritz Wiese,et al. A Channel Under Simultaneous Jamming and Eavesdropping Attack—Correlated Random Coding Capacities Under Strong Secrecy Criteria , 2014, IEEE Transactions on Information Theory.
[36] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[37] Di Zhao,et al. Secrecy Balancing over Two-User MISO Interference Channels with Rician Fading , 2013 .
[38] Raef Bassily,et al. Ergodic Secret Alignment , 2010, IEEE Transactions on Information Theory.
[39] E. Tekin. Secrecy Sum-Rates for the Multiple-Access WireTap Channel with Ergodic Block Fading , 2007 .
[40] Il-Min Kim,et al. Cooperative jamming polar codes for multiple-access wiretap channels , 2016, IET Commun..
[41] I. S. Gradshteyn,et al. Table of Integrals, Series, and Products , 1976 .
[42] Remi A. Chou,et al. Uniform distributed source coding for the multiple access wiretap channel , 2014, 2014 IEEE Conference on Communications and Network Security.
[43] Jörg Kliewer,et al. Low-complexity channel resolvability codes for the symmetric multiple-access channel , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[44] Yueming Cai,et al. Opportunistic relaying and jamming with robust design in hybrid full/half-duplex relay system , 2016, EURASIP J. Wirel. Commun. Netw..
[45] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[46] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[47] Ying Wang,et al. Distributed coalitional game for friendly jammer selection in ultra-dense networks , 2016, EURASIP J. Wirel. Commun. Netw..
[48] L. H. Abderrahmane,et al. Design of an Adaptive Communication System for Implementation on Board a Future Algerian LEO Satellite , 2008, 2008 IEEE Aerospace Conference.
[49] Tomoaki Ohtsuki,et al. Joint SVD-GSVD Precoding Technique and Secrecy Capacity Lower Bound for the MIMO Relay Wire-Tap Channel , 2012, VTC Spring.
[50] Pritam Mukherjee,et al. Secure degrees of freedom of the multiple access wiretap channel with no eavesdropper CSI , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[51] Robert A. Profet,et al. 2004 IEEE AEROSPACE CONFERENCES BOARD OF DIRECTORS , 2004 .
[52] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[53] Derrick Wing Kwan Ng,et al. Joint Beamforming and Power Allocation for Secrecy in Peer-to-Peer Relay Networks , 2015, IEEE Transactions on Wireless Communications.
[54] Ali Ghrayeb,et al. Achieving Full Secure Degrees-of-Freedom for the MISO Wiretap Channel With an Unknown Eavesdropper , 2016, IEEE Transactions on Wireless Communications.
[55] Jianwei Xie,et al. Secure degrees of freedom region of the Gaussian multiple access wiretap channel , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[56] Yuan Jiang,et al. Secrecy outage analysis of multi-user cellular networks in the face of cochannel interference , 2015, 2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC).