Secure communication over MISO cognitive radio channels
暂无分享,去创建一个
Yiyang Pei | Ying-Chang Liang | Kwok Hung Li | Kah Chan Teh | Lan Zhang | K. H. Li | K. C. Teh | Ying-Chang Liang | Lan Zhang | Yiyang Pei
[1] H. Vincent Poor,et al. Cognitive multiple access channels: optimal power allocation for weighted sum rate maximization , 2009, IEEE Transactions on Communications.
[2] Ying-Chang Liang,et al. Optimal design of learning based MIMO cognitive radio systems , 2009, 2009 IEEE International Symposium on Information Theory.
[3] Jos F. Sturm,et al. A Matlab toolbox for optimization over symmetric cones , 1999 .
[4] Brian M. Sadler,et al. A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.
[5] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[6] Ying-Chang Liang,et al. Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks , 2007, IEEE Journal of Selected Topics in Signal Processing.
[7] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[8] Yiyang Pei,et al. Robust Beamforming Design: From Cognitive Radio MISO Channels to Secrecy MISO Channels , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[9] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .
[10] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[11] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[12] Yiyang Pei,et al. Achieving cognitive and secure transmissions using multiple antennas , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[13] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Shlomo Shamai,et al. The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.
[16] Arkadi Nemirovski,et al. Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.
[17] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[18] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[19] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[20] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[21] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[22] Ying-Chang Liang,et al. Weighted sum rate optimization for cognitive radio MIMO broadcast channels , 2009, IEEE Transactions on Wireless Communications.
[23] Ying-Chang Liang,et al. Optimal power allocation for fading channels in cognitive radio networks: Ergodic capacity and outage capacity , 2008, IEEE Transactions on Wireless Communications.
[24] H. Vincent Poor,et al. Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.
[25] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[26] Amir Ghasemi,et al. Fundamental limits of spectrum-sharing in fading environments , 2007, IEEE Transactions on Wireless Communications.