暂无分享,去创建一个
Aylin Yener | Xiang He | A. Yener | Xiang He
[1] Erik Ordentlich,et al. On the Degrees-of-Freedom of the K-user Gaussian interference channel , 2009, 2009 IEEE International Symposium on Information Theory.
[2] Sae-Young Chung,et al. Capacity Bounds for Two-Way Relay Channels , 2008, 2008 IEEE International Zurich Seminar on Communications.
[3] Alexander Sprintson,et al. Joint Physical Layer Coding and Network Coding for Bidirectional Relaying , 2008, IEEE Transactions on Information Theory.
[4] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[5] Roy D. Yates,et al. Secrecy capacity region of a class of one-sided interference channel , 2008, 2008 IEEE International Symposium on Information Theory.
[6] Aylin Yener,et al. A new outer bound for the gaussian interference channel with confidential messages , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.
[7] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[8] A. Sridharan. Broadcast Channels , 2022 .
[9] H. Vincent Poor,et al. Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.
[10] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[11] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[12] Shlomo Shamai,et al. A layered lattice coding scheme for a class of three user Gaussian interference channels , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[13] Syed Ali Jafar,et al. Interference Alignment With Asymmetric Complex Signaling—Settling the Høst-Madsen–Nosratinia Conjecture , 2009, IEEE Transactions on Information Theory.
[14] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[15] Aylin Yener,et al. Providing secrecy with lattice codes , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[16] H. Vincent Poor,et al. The Gaussian wiretap channel with a helping interferer , 2008, 2008 IEEE International Symposium on Information Theory.
[17] Tie Liu,et al. An Extremal Inequality Motivated by Multiterminal Information-Theoretic Problems , 2006, IEEE Transactions on Information Theory.
[18] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[19] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[20] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[21] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[22] J. N. Laneman,et al. On the secrecy capacity of arbitrary wiretap channels , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[23] Simon Litsyn,et al. Lattices which are good for (almost) everything , 2005, IEEE Transactions on Information Theory.
[24] Thomas C. Hales. Sphere packings, I , 1997, Discret. Comput. Geom..
[25] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[26] G. David Forney,et al. On the role of MMSE estimation in approaching the information-theoretic limits of linear Gaussian channels: Shannon meets Wiener , 2004, ArXiv.
[27] W. Fischer,et al. Sphere Packings, Lattices and Groups , 1990 .
[28] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[29] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[30] Abhay Parekh,et al. The Approximate Capacity of the Many-to-One and One-to-Many Gaussian Interference Channels , 2008, IEEE Transactions on Information Theory.
[31] Sriram Vishwanath,et al. Capacity of Symmetric K-User Gaussian Very Strong Interference Channels , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[32] H. Vincent Poor,et al. The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.
[33] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[34] Michael Gastpar,et al. The case for structured random codes in network capacity theorems , 2008, Eur. Trans. Telecommun..
[35] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[36] Michael Gastpar,et al. Compute-and-forward: Harnessing interference with structured codes , 2008, 2008 IEEE International Symposium on Information Theory.
[37] S. Ulukus,et al. On the secrecy of multiple access wiretap channel , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[38] Hans-Andrea Loeliger,et al. Averaging bounds for lattices and linear codes , 1997, IEEE Trans. Inf. Theory.
[39] Shlomo Shamai,et al. Interference alignment on the deterministic channel and application to fully connected AWGN interference networks , 2008, 2008 IEEE Information Theory Workshop.
[40] E. Tekin,et al. On Secure Signaling for the Gaussian Multiple Access Wire-tap Channel , 2005, Conference Record of the Thirty-Ninth Asilomar Conference onSignals, Systems and Computers, 2005..
[41] Uri Erez,et al. Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding , 2004, IEEE Transactions on Information Theory.
[42] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[43] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[44] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[45] Aylin Yener,et al. K-user interference channels: Achievable secrecy rate and degrees of freedom , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.
[46] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[47] Syed Ali Jafar,et al. Interference Alignment and Degrees of Freedom of the $K$-User Interference Channel , 2008, IEEE Transactions on Information Theory.