Secure Index and Data Symbol Modulation for OFDM-IM
暂无分享,去创建一个
Jinho Choi | Youngwook Ko | Yonggu Lee | Hanseong Jo | Jinho Choi | Y. Ko | Yonggu Lee | Hanseong Jo
[1] Lajos Hanzo,et al. Dual-Mode Index Modulation Aided OFDM , 2017, IEEE Access.
[2] Xianbin Wang,et al. Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving , 2015, IEEE Transactions on Wireless Communications.
[3] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[4] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.
[5] Li Wang,et al. Secrecy Enhancement Analysis Against Unknown Eavesdropping in Spatial Modulation , 2015, IEEE Communications Letters.
[6] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[7] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[8] Harald Haas,et al. Spatial Modulation , 2008, IEEE Transactions on Vehicular Technology.
[9] Roland Siegwart,et al. People detection and tracking from aerial thermal views , 2014, 2014 IEEE International Conference on Robotics and Automation (ICRA).
[10] Harald Haas,et al. Enhanced subcarrier index modulation (SIM) OFDM , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[11] George K. Karagiannidis,et al. OFDM-IM vs FQAM: A comparative analysis , 2016, 2016 23rd International Conference on Telecommunications (ICT).
[12] Harald Haas,et al. Subcarrier-index modulation OFDM , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[13] Yueming Cai,et al. On the secrecy mutual information of spatial modulation with finite alphabet , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).
[14] Chen-Mou Cheng,et al. Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.
[15] Jinho Choi. Adaptive and Iterative Signal Processing in Communications , 2006 .
[16] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[17] Chung G. Kang,et al. MIMO-OFDM Wireless Communications with MATLAB , 2010 .
[18] H. Vincent Poor,et al. Orthogonal Frequency Division Multiplexing With Index Modulation , 2012, IEEE Transactions on Signal Processing.
[19] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[20] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[21] H. Vincent Poor,et al. Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.
[22] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[23] Lie-Liang Yang,et al. Transmitter Precoding-Aided Spatial Modulation for Secrecy Communications , 2016, IEEE Transactions on Vehicular Technology.
[24] Jinho Choi,et al. Physical layer security for wireless sensor networks , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[25] Thien Van Luong,et al. Impact of CSI Uncertainty on MCIK-OFDM: Tight Closed-Form Symbol Error Probability Analysis , 2017, IEEE Transactions on Vehicular Technology.
[26] Youngwook Ko,et al. A Tight Upper Bound on Bit Error Rate of Joint OFDM and Multi-Carrier Index Keying , 2014, IEEE Communications Letters.
[27] Jinho Choi. Optimal Combining and Detection: Statistical Signal Processing for Communications , 2010 .
[28] Ertugrul Basar,et al. Index modulation techniques for 5G wireless networks , 2016, IEEE Communications Magazine.
[29] Xia Wang,et al. Spatial modulation aided physical layer security enhancement for fading wiretap channels , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[30] Tianqi Mao,et al. Generalized Dual-Mode Index Modulation Aided OFDM , 2017, IEEE Communications Letters.
[31] Yao Zheng,et al. Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security , 2015, IEEE Wireless Communications Letters.
[32] D. Luengo,et al. Secure communications using OFDM with chaotic modulation in the subcarriers , 2005, 2005 IEEE 61st Vehicular Technology Conference.
[33] Jianping Zheng,et al. Achieving Transmit Diversity in OFDM-IM by Utilizing Multiple Signal Constellations , 2017, IEEE Access.
[34] Marco Di Renzo,et al. On secrecy rate analysis of spatial modulation and space shift keying , 2015, 2015 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom).
[35] Ertugrul Basar,et al. On Multiple-Input Multiple-Output OFDM with Index Modulation for Next Generation Wireless Networks , 2016, IEEE Transactions on Signal Processing.
[36] Mounir Ghogho,et al. Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation , 2011, Phys. Commun..
[37] Lajos Hanzo,et al. Subcarrier-Index Modulation Aided OFDM - Will It Work? , 2016, IEEE Access.
[38] Youngwook Ko,et al. Low complexity greedy detection method with generalized multicarrier index keying OFDM , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[39] François Gagnon,et al. An LPI design for secure OFDM systems , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[40] Jinho Choi,et al. Coded OFDM-IM With Transmit Diversity , 2017, IEEE Transactions on Communications.
[41] Pallaviram Sure,et al. A survey on OFDM channel estimation techniques based on denoising strategies , 2017 .
[42] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .