Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective
暂无分享,去创建一个
Zhu Han | Yichen Wang | Pinyi Ren | Xiao Tang | Xiao Tang | Zhu Han | Pinyi Ren | Yichen Wang
[1] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[2] Jorge Nocedal,et al. An interior algorithm for nonlinear optimization that combines line search and trust region steps , 2006, Math. Program..
[3] Ashutosh Sabharwal,et al. Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.
[4] Sachin Katti,et al. Full duplex radios , 2013, SIGCOMM.
[5] Matthew R. McKay,et al. Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks , 2013, IEEE Transactions on Information Forensics and Security.
[6] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[7] Zhi Ding,et al. On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input , 2011, IEEE Transactions on Communications.
[8] Tiejun Lv,et al. Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.
[9] Xiang-Yang Li,et al. Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication , 2012, IEEE Journal on Selected Areas in Communications.
[10] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[11] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[12] Ananthanarayanan Chockalingam,et al. Decode-and-Forward Relay Beamforming for Secrecy with Finite-Alphabet Input , 2013, IEEE Communications Letters.
[13] Jorge Nocedal,et al. A trust region method based on interior point techniques for nonlinear programming , 2000, Math. Program..
[14] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[15] Ė. B. Vinberg,et al. A course in algebra , 2003 .
[16] A. Lee Swindlehurst,et al. A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[17] Pierre Duhamel,et al. Achievable Secrecy Rates for the Broadcast Channel With Confidential Message and Finite Constellation Inputs , 2015, IEEE Transactions on Communications.
[18] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[19] Laura Galluccio,et al. Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis , 2015, IEEE Transactions on Wireless Communications.
[20] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[21] Gaston H. Gonnet,et al. On the LambertW function , 1996, Adv. Comput. Math..
[22] Tao Zhang,et al. Secure Multiantenna Cognitive Wiretap Networks , 2017, IEEE Transactions on Vehicular Technology.
[23] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[24] Yichen Wang,et al. Securing Wireless Transmission against Reactive Jamming: A Stackelberg Game Framework , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[25] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[26] Zhu Han,et al. On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.
[27] Jong-Ho Lee,et al. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.
[28] R. Lucchetti,et al. Existence theorems of equilibrium points in stackelberg , 1987 .
[29] J. L. Massey,et al. An introduction to contemporary cryptology , 1988, Proc. IEEE.
[30] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[31] Qiang Li,et al. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.
[32] Qiang Li,et al. Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.
[33] Zhi Ding,et al. Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.
[34] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[35] Dongfeng Yuan,et al. Secrecy rate analysis for jamming assisted relay communications systems , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[36] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[37] Charalambos D. Charalambous,et al. An Algorithm for Global Maximization of Secrecy Rates in Gaussian MIMO Wiretap Channels , 2015, IEEE Transactions on Communications.
[38] Zhi Chen,et al. A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.
[39] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[40] Derrick Wing Kwan Ng,et al. Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.
[41] Zhu Han,et al. Combating full-duplex active eavesdropper: A game-theoretic perspective , 2016, 2016 IEEE International Conference on Communications (ICC).
[42] Victor C. M. Leung,et al. In-Band Full-Duplex Relaying: A Survey, Research Issues and Challenges , 2015, IEEE Communications Surveys & Tutorials.
[43] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[44] Bethany L. Nicholson,et al. Mathematical Programs with Equilibrium Constraints , 2021, Pyomo — Optimization Modeling in Python.
[45] H. Vincent Poor,et al. Secure Communication Under Channel Uncertainty and Adversarial Attacks , 2015, Proceedings of the IEEE.