暂无分享,去创建一个
Trung Quang Duong | Ha Hoang Kha | Tung Thanh Vu | Nguyen-Son Vo | H. H. Kha | T. Duong | Thanh Tung Vu | Nguyen-Son Vo
[1] Wan Choi,et al. Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law , 2014, IEEE Transactions on Signal Processing.
[2] Robert W. Heath,et al. Interference alignment via alternating minimization , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[3] Liang Zhong,et al. Iterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels , 2016, IEEE Transactions on Information Forensics and Security.
[4] A. Lee Swindlehurst,et al. Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[5] Matthew R. McKay,et al. Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.
[6] Tiejun Lv,et al. Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.
[7] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[8] H. Luetkepohl. The Handbook of Matrices , 1996 .
[9] Dimitris S. Papailiopoulos,et al. Interference Alignment as a Rank Constrained Rank Minimization , 2010, IEEE Transactions on Signal Processing.
[10] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[11] Adeel Razi,et al. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.
[12] Il-Min Kim,et al. Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[13] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[14] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[15] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[16] H. Vincent Poor,et al. Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.
[17] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[18] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[19] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[20] Matthew R. McKay,et al. Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.
[21] Tiejun Lv,et al. Co-Ordinated Secure Beamforming in $K$-User Interference Channel With Multiple Eavesdroppers , 2016, IEEE Wireless Communications Letters.
[22] Trung Quang Duong,et al. Interference alignment designs for secure multiuser MIMO systems: rank constrained rank minimization approach , 2015, 2015 International Conference on Communications, Management and Telecommunications (ComManTel).
[23] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[24] A. H. Kayran,et al. On Feasibility of Interference Alignment in MIMO Interference Networks , 2009, IEEE Transactions on Signal Processing.
[25] Trung Quang Duong,et al. Wiretapped signal leakage minimization for secure multiuser MIMO systems via interference alignment , 2015, 2015 International Conference on Advanced Technologies for Communications (ATC).
[26] Tharmalingam Ratnarajah,et al. Interference alignment for peer-to-peer underlay MIMO cognitive radio network , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[27] Wolfgang Utschick,et al. Interference alignment via minimizing projector distances of interfering subspaces , 2012, 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[28] Moe Z. Win,et al. Generalized Interference Alignment—Part II: Application to Wireless Secrecy , 2016, IEEE Transactions on Signal Processing.
[29] Jinhong Yuan,et al. Confidential Broadcasting via Linear Precoding in Non-Homogeneous MIMO Multiuser Networks , 2014, IEEE Transactions on Communications.
[30] Xiang Chen,et al. Interference Alignment in Dual-Hop MIMO Interference Channel , 2014, IEEE Transactions on Wireless Communications.
[31] Qiang Li,et al. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.
[32] H. Sasaoka,et al. Secure communications using Interference Alignment in MIMO interference channels , 2012, 2012 International Symposium on Antennas and Propagation (ISAP).
[33] Tiejun Lv,et al. Limited feedback schemes based on inter-cell interference alignment in two-cell interfering MIMO-MAC , 2013, 2013 IEEE International Conference on Communications (ICC).
[34] Markku J. Juntti,et al. On Linear Precoding Strategies for Secrecy Rate Maximization in Multiuser Multiantenna Wireless Networks , 2014, IEEE Transactions on Signal Processing.
[35] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[36] Tiejun Lv,et al. Limited Feedback-Based Interference Alignment for Interfering Multi-Access Channels , 2014, IEEE Communications Letters.
[37] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[38] A. Lee Swindlehurst,et al. MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.
[39] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[40] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[41] Syed Ali Jafar,et al. Interference Alignment and Degrees of Freedom of the $K$-User Interference Channel , 2008, IEEE Transactions on Information Theory.
[42] Feng Xue,et al. An iterative algorithm for joint signal and interference alignment , 2010, 2010 IEEE International Symposium on Information Theory.
[43] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[44] A. H. Kayran,et al. On Feasibility of Interference Alignment in MIMO Interference Networks , 2009, IEEE Transactions on Signal Processing.
[45] Caijun Zhong,et al. Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.