Secrecy Performance Analysis for Hybrid Wiretapping Systems Using Random Matrix Theory
暂无分享,去创建一个
Zhu Han | Hui Chen | Xiaofeng Tao | Na Li | Jin Xu | Yanzhao Hou
[1] Zhu Han,et al. Distributed Power Optimization for Security-Aware Multi-Channel Full-Duplex Communications: A Variational Inequality Framework , 2017, IEEE Transactions on Communications.
[2] Jeffrey G. Andrews,et al. Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.
[3] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[4] Qian Yang,et al. Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers , 2016, IEEE Transactions on Wireless Communications.
[5] Zhi Chen,et al. MIMO Secret Communications Against an Active Eavesdropper , 2016, IEEE Transactions on Information Forensics and Security.
[6] D. Stoyan,et al. Stochastic Geometry and Its Applications , 1989 .
[7] Lifeng Wang,et al. Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[8] P. Spreij. Probability and Measure , 1996 .
[9] Zhu Han,et al. Resource allocation in full-duplex communications for future wireless networks , 2015, IEEE Wireless Communications.
[10] Joseph Lipka,et al. A Table of Integrals , 2010 .
[11] Vijay K. Bhargava,et al. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.
[12] Jeffrey G. Andrews,et al. Statistics of Co-Channel Interference in a Field of Poisson and Poisson-Poisson Clustered Interferers , 2010, IEEE Transactions on Signal Processing.
[13] M. Lavanya,et al. Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection with outdated CSI , 2017 .
[14] Navrati Saxena,et al. Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.
[15] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[16] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[17] Zhijin Qin,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[18] F. B. Hildebrand,et al. Introduction To Numerical Analysis , 1957 .
[19] Jeffrey G. Andrews,et al. Secrecy Rates in Broadcast Channels with Confidential Messages and External Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[20] R. Couillet,et al. Random Matrix Methods for Wireless Communications: Estimation , 2011 .
[21] Jinhong Yuan,et al. Confidential Broadcasting via Linear Precoding in Non-Homogeneous MIMO Multiuser Networks , 2014, IEEE Transactions on Communications.
[22] Kai-Kit Wong,et al. Full-Duplex Small-Cell Networks: A Physical-Layer Security Perspective , 2018, IEEE Transactions on Communications.
[23] A. Lee Swindlehurst,et al. A vector-perturbation technique for near-capacity multiantenna multiuser communication-part II: perturbation , 2005, IEEE Transactions on Communications.
[24] Halim Yanikomeroglu,et al. Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.
[25] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[26] Zhu Han,et al. Secrecy performance analysis of hybrid eavesdroppers system using stochastic geometry and random matrix theory , 2017, 2017 IEEE International Conference on Communications (ICC).
[27] Qiang Li,et al. Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.
[28] Qimei Cui,et al. Large-System Analysis of Artificial-Noise-Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum Rate and Optimal Power Allocation , 2016, IEEE Transactions on Vehicular Technology.
[29] Gene H. Golub,et al. Matrix computations , 1983 .
[30] C. Tracy,et al. The Distributions of Random Matrix Theory and their Applications , 2009 .
[31] Can Emre Koksal,et al. On the Secrecy Capacity of Block Fading Channels With a Hybrid Adversary , 2013, IEEE Transactions on Information Theory.
[32] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[33] Zhu Han,et al. Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.
[34] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[35] Jeffrey G. Andrews,et al. What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.
[36] Justin P. Coon,et al. Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[37] Robert W. Heath,et al. Modeling heterogeneous network interference , 2012, 2012 Information Theory and Applications Workshop.
[38] Mérouane Debbah,et al. Large System Analysis of Linear Precoding in Correlated MISO Broadcast Channels Under Limited Feedback , 2009, IEEE Transactions on Information Theory.
[39] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[40] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[41] Tharmalingam Ratnarajah,et al. On Ergodic Secrecy Capacity of Random Wireless Networks With Protected Zones , 2016, IEEE Transactions on Vehicular Technology.
[42] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[43] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.