A Versatile Secure Transmission Strategy in the Presence of Outdated CSI
暂无分享,去创建一个
[1] Trung Quang Duong,et al. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[2] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[3] Gilles Burel,et al. Hierarchical Space-Time Block Code Recognition Using Correlation Matrices , 2008, IEEE Transactions on Wireless Communications.
[4] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[5] Wenbo Wang,et al. Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation , 2012, Journal of Communications and Networks.
[6] Octavia A. Dobre,et al. Blind Identification of Spatial Multiplexing and Alamouti Space-Time Block Code via Kolmogorov-Smirnov (K-S) Test , 2014, IEEE Communications Letters.
[7] Yahia A. Eldemerdash,et al. Second-Order Cyclostationarity of BT-SCLD Signals: Theoretical Developments and Applications to Signal Classification and Blind Parameter Estimation , 2013, IEEE Transactions on Wireless Communications.
[8] Donald F. Towsley,et al. Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.
[9] George K. Karagiannidis,et al. Amplify-and-Forward Relay Selection with Outdated Channel Estimates , 2012, IEEE Transactions on Communications.
[10] Gilles Burel,et al. Blind Recognition of Linear Space–Time Block Codes: A Likelihood-Based Approach , 2010, IEEE Transactions on Signal Processing.
[11] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[12] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[13] Norman C. Beaulieu,et al. On first-order Markov modeling for the Rayleigh fading channel , 2000, IEEE Trans. Commun..
[14] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[15] Matthew R. McKay,et al. Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.
[16] Octavia A. Dobre,et al. Identification of SM-OFDM and AL-OFDM Signals Based on Their Second-Order Cyclostationarity , 2015, IEEE Transactions on Vehicular Technology.
[17] Xiangyun Zhou,et al. On–Off-Based Secure Transmission Design With Outdated Channel State Information , 2016, IEEE Transactions on Vehicular Technology.
[18] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[19] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[20] Yahia A. Eldemerdash,et al. Blind Identification of SM and Alamouti STBC-OFDM Signals , 2015, IEEE Transactions on Wireless Communications.
[21] Gerhard Fettweis,et al. Algorithm for Detecting the Number of Transmit Antennas in MIMO-OFDM Systems , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[22] Yueming Cai,et al. A New Secure Transmission Scheme With Outdated Antenna Selection , 2015, IEEE Transactions on Information Forensics and Security.
[23] M. Berbineau,et al. Blind detection of the number of transmitting antennas for spatially-correlated MIMO systems , 2011, 2011 11th International Conference on ITS Telecommunications.
[24] Feng Liu,et al. Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.
[25] Octavia A. Dobre,et al. Signal identification for emerging intelligent radios: classical problems and new challenges , 2015, IEEE Instrumentation & Measurement Magazine.
[26] Xiangyun Zhou,et al. Secure On-Off Transmission Design With Channel Estimation Errors , 2013, IEEE Transactions on Information Forensics and Security.
[27] Y. Bar-Ness,et al. Blind modulation classification: a concept whose time has come , 2005, IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005..