Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers
暂无分享,去创建一个
Björn E. Ottersten | Athina P. Petropulu | Gan Zheng | Ioannis Krikidis | Jiangyuan Li | B. Ottersten | A. Petropulu | G. Zheng | I. Krikidis | Jiangyuan Li
[1] Qiang Li,et al. Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[2] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[3] Kostas Berberidis,et al. Full-Duplex Relaying over Block Fading Channel: A Diversity Perspective , 2012, IEEE Transactions on Wireless Communications.
[4] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[5] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[6] Mats Viberg,et al. Self-interference suppression in full-duplex MIMO relays , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[7] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[8] Athina P. Petropulu,et al. Outage constrained secrecy rate maximization using cooperative jamming , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).
[9] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[10] Taneli Riihonen,et al. Optimized gain control for single-frequency relaying with loop interference , 2009, IEEE Transactions on Wireless Communications.
[11] A. Lee Swindlehurst,et al. Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[12] Dina Katabi,et al. Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.
[13] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[14] Taneli Riihonen,et al. Hybrid Full-Duplex/Half-Duplex Relaying with Transmit Power Adaptation , 2011, IEEE Transactions on Wireless Communications.
[15] Shuzhong Zhang,et al. Complex Matrix Decomposition and Quadratic Programming , 2007, Math. Oper. Res..
[16] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[17] A. Lee Swindlehurst,et al. A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[18] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[19] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[20] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[21] Zhiguo Ding,et al. A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.
[22] Philip Schniter,et al. Full-Duplex MIMO Relaying: Achievable Rates Under Limited Dynamic Range , 2011, IEEE Journal on Selected Areas in Communications.
[23] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[24] Mounir Ghogho,et al. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.
[25] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[26] Taneli Riihonen,et al. Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.
[27] Le Thi Hoai An,et al. The DC (Difference of Convex Functions) Programming and DCA Revisited with DC Models of Real World Nonconvex Optimization Problems , 2005, Ann. Oper. Res..
[28] N. K. Shankaranarayanan,et al. Design and Characterization of a Full-Duplex Multiantenna System for WiFi Networks , 2012, IEEE Transactions on Vehicular Technology.
[29] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[30] Cong Ling,et al. Lattice codes achieving strong secrecy over the mod-Λ Gaussian Channel , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[31] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[32] Dan Raphaeli,et al. Series expansions for the distribution of noncentral indefinite quadratic forms in complex normal variables , 1995 .
[33] M. E. Knox,et al. Single antenna full duplex communications using a common carrier , 2012, WAMICON 2012 IEEE Wireless & Microwave Technology Conference.