Fast Power Allocation for Secure Communication With Full-Duplex Radio
暂无分享,去创建一个
Lei Chen | Yingbo Hua | Qiping Zhu | Weixiao Meng | Y. Hua | W. Meng | Qiping Zhu | Lei Chen
[1] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[2] Gil Zussman,et al. 1 Chip 2x the bandwidth , 2016, IEEE Spectrum.
[3] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[4] H. Vincent Poor,et al. Interference Assisted Secret Communication , 2008, IEEE Transactions on Information Theory.
[5] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[6] Roy D. Yates,et al. Secrecy capacity of independent parallel channels , 2009 .
[7] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[8] Ashutosh Sabharwal,et al. Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.
[9] Derrick Wing Kwan Ng,et al. Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.
[10] Lei Chen,et al. Fast computation for secure communication with full-duplex radio , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[11] A. Lee Swindlehurst,et al. Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.
[12] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[13] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[14] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[15] Derrick Wing Kwan Ng,et al. Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.
[16] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[17] Zhi Chen,et al. A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.
[18] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[19] Tao Zhang,et al. Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.
[20] Amir Beck,et al. On the Convergence of Block Coordinate Descent Type Methods , 2013, SIAM J. Optim..
[21] Tho Le-Ngoc,et al. Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols , 2015, IEEE Transactions on Information Forensics and Security.
[22] Yiming Ma,et al. A Method for Broadband Full-Duplex MIMO Radio , 2012, IEEE Signal Processing Letters.
[23] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[24] Zhi Xue,et al. Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization , 2014, IEEE Signal Processing Letters.
[25] Philip Levis,et al. Applications of self-interference cancellation in 5G and beyond , 2014, IEEE Communications Magazine.
[26] Taneli Riihonen,et al. Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.
[27] C. Fleury. Sequential Convex Programming for Structural Optimization Problems , 1993 .
[28] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[29] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[30] Mounir Ghogho,et al. Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.
[31] Yifan Li,et al. Radio self-interference cancellation by transmit beamforming, all-analog cancellation and blind digital tuning , 2015, Signal Process..
[32] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[33] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[34] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.