Ergodic Achievable Secrecy Rate of Multiple-Antenna Relay Systems With Cooperative Jamming
暂无分享,去创建一个
Yongming Huang | Vincent K. N. Lau | Wei Wang | Rui Zhao | Yongming Huang | V. Lau | Wei Wang | Rui Zhao
[1] Xiaoming Chen,et al. Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.
[2] Caijun Zhong,et al. Ergodic Capacity Comparison of Different Relay Precoding Schemes in Dual-Hop AF Systems With Co-Channel Interference , 2014, IEEE Transactions on Communications.
[3] Mazen O. Hasna,et al. A performance study of dual-hop transmissions with fixed gain relays , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[4] Jing Wang,et al. Cooperative jamming and power allocation in three-phase two-way relaying wiretap systems , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[5] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[6] Mohamed-Slim Alouini,et al. On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.
[7] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[8] Il-Min Kim,et al. Secure Transmission for Multiuser Relay Networks , 2015, IEEE Transactions on Wireless Communications.
[9] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[10] Erik G. Larsson,et al. Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.
[11] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[12] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[13] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[14] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[15] Aydin Behnad,et al. On the Secrecy Rate Achievability in Dual-Hop Amplify-and-Forward Relay Networks , 2014, IEEE Wireless Communications Letters.
[16] Kin K. Leung,et al. Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting , 2011, IEEE Transactions on Wireless Communications.
[17] George K. Karagiannidis,et al. Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.
[18] Jianhua Ge,et al. Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay Networks , 2014, IEEE Communications Letters.
[19] H. Vincent Poor,et al. Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.
[20] Joseph Lipka,et al. A Table of Integrals , 2010 .
[21] Joy Kuri,et al. Secure Transmission in Amplify and Forward Networks for Multiple Degraded Eavesdroppers , 2014, ArXiv.
[22] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[23] H. Vincent Poor,et al. On the Secure Degrees of Freedom of Relaying With Half-Duplex Feedback , 2011, IEEE Transactions on Information Theory.
[24] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[25] Zhiguo Ding,et al. A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.
[26] Olga Muñoz Medina,et al. Linear transceiver design in nonregenerative relays with channel state information , 2007 .
[27] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[28] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[29] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[30] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[31] Qi Xiong,et al. Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information , 2014, IEEE Wireless Communications Letters.
[32] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[33] Shi Jin,et al. Ergodic Rate Analysis for Multipair Massive MIMO Two-Way Relay Networks , 2015, IEEE Transactions on Wireless Communications.
[34] Feng Xu,et al. Diversity order for amplify-and-forward dual-hop systems with fixed-gain relay under Nakagami fading channels , 2010, IEEE Transactions on Wireless Communications.
[35] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[36] Thomas L. Marzetta,et al. Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.
[37] Feng Liu,et al. Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.