Secrecy Energy Efficiency for MIMO Single- and Multi-Cell Downlink Transmission With Confidential Messages
暂无分享,去创建一个
Eduard A. Jorswieck | Alessio Zappone | Pin-Hsun Lin | Eduard Axel Jorswieck | Pin-Hsun Lin | A. Zappone
[1] Athina P. Petropulu,et al. Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.
[2] Jin Xu,et al. Secure Transmission in MISOME Wiretap Channel With Multiple Assisting Jammers: Maximum Secrecy Rate and Optimal Power Allocation , 2017, IEEE Transactions on Communications.
[3] Shlomo Shamai,et al. An Information Theoretic Approach to Secret Sharing , 2015, IEEE Transactions on Information Theory.
[4] Kaisa Miettinen,et al. Nonlinear multiobjective optimization , 1998, International series in operations research and management science.
[5] Geoffrey Ye Li,et al. Distributed Interference-Aware Energy-Efficient Power Optimization , 2011, IEEE Transactions on Wireless Communications.
[6] Charalambos D. Charalambous,et al. On optimal signaling over secure MIMO channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[7] Yongming Huang,et al. Energy-Efficient Precoder Design for MIMO Wiretap Channels , 2014, IEEE Communications Letters.
[8] A. Lee Swindlehurst,et al. On the Optimality of Linear Precoding for Secrecy in the MIMO Broadcast Channel , 2013, IEEE Journal on Selected Areas in Communications.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Muhammad Ali Imran,et al. How much energy is needed to run a wireless network? , 2011, IEEE Wireless Communications.
[11] Xiaoming Chen,et al. Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.
[12] Qi Zhang,et al. Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks , 2016, IEEE Transactions on Vehicular Technology.
[13] Athina P. Petropulu,et al. On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.
[14] Mohamed-Slim Alouini,et al. On Secure Underlay MIMO Cognitive Radio Networks With Energy Harvesting and Transmit Antenna Selection , 2017, IEEE Transactions on Green Communications and Networking.
[15] Derrick Wing Kwan Ng,et al. Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.
[16] Eduard A. Jorswieck,et al. Energy Efficiency in Wireless Networks via Fractional Programming Theory , 2015, Found. Trends Commun. Inf. Theory.
[17] Eduard A. Jorswieck,et al. Energy Efficiency and Interference Neutralization in Two-Hop MIMO Interference Channels , 2014, IEEE Transactions on Signal Processing.
[18] Shih-Chun Lin,et al. On Secrecy Capacity of Fast Fading Multiple-Input Wiretap Channels With Statistical CSIT , 2012, IEEE Transactions on Information Forensics and Security.
[19] H. Vincent Poor,et al. On Energy-Secrecy Trade-Offs for Gaussian Wiretap Channels , 2013, IEEE Transactions on Information Forensics and Security.
[20] Eduard A. Jorswieck,et al. On Stochastic Orders and Fast Fading Multiuser Channels with Statistical CSIT , 2017, 1712.03692.
[21] Athina P. Petropulu,et al. Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels , 2009, ArXiv.
[22] Eduard A. Jorswieck,et al. Energy Efficiency of Confidential Multi-Antenna Systems With Artificial Noise and Statistical CSI , 2016, IEEE Journal of Selected Topics in Signal Processing.
[23] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[24] Costas N. Georghiades,et al. Secrecy Capacity per Unit Cost , 2013, IEEE Journal on Selected Areas in Communications.
[25] Emil Björnson,et al. Globally Optimal Energy-Efficient Power Control and Receiver Design in Wireless Networks , 2016, IEEE Transactions on Signal Processing.
[26] Gerhard Fettweis,et al. Framework for Link-Level Energy Efficiency Optimization with Informed Transmitter , 2011, IEEE Transactions on Wireless Communications.
[27] Emre Telatar,et al. Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..
[28] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[29] Justin P. Coon,et al. Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[30] Shlomo Shamai,et al. The Capacity Region of the Gaussian Multiple-Input Multiple-Output Broadcast Channel , 2006, IEEE Transactions on Information Theory.
[31] Symeon Chatzinotas,et al. Secrecy energy efficiency optimization for MISO and SISO communication networks , 2015, 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[32] Yingbin Liang,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages , 2009, IEEE Transactions on Information Theory.
[33] Cheng-Liang Lin,et al. On Secrecy Capacity of Fast Fading MIMOME Wiretap Channels with Statistical CSIT , 2013, IEEE Transactions on Wireless Communications.
[34] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[35] J. Shanthikumar,et al. Multivariate Stochastic Orders , 2007 .
[36] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[37] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[38] Justin P. Coon,et al. Network Coding for Physical Layer Secrecy , 2018, IEEE Wireless Communications Letters.
[39] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[40] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[41] I. S. Ansari,et al. Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.
[42] Wei-Ping Zhu,et al. Secrecy Energy Efficiency Maximization in Cognitive Radio Networks , 2017, IEEE Access.
[43] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[44] Are Hjørungnes. Complex-Valued Matrix Derivatives: Preface , 2011 .
[45] A. Lee Swindlehurst,et al. MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.
[46] Kai-Kit Wong,et al. Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[47] Gordon P. Wright,et al. Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..
[48] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[49] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[50] Xiaoming Chen,et al. Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee , 2013, IEEE Communications Letters.
[51] Jeffrey G. Andrews,et al. Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.
[52] George A. F. Seber,et al. A matrix handbook for statisticians , 2007 .
[53] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[54] Yu Gong,et al. Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.
[55] Zhi-Quan Luo,et al. A Unified Convergence Analysis of Block Successive Minimization Methods for Nonsmooth Optimization , 2012, SIAM J. Optim..
[56] Qi Zhang,et al. Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.
[57] Jacques A. Ferland,et al. Algorithms for generalized fractional programming , 1991, Math. Program..
[58] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[59] Shlomo Shamai,et al. Broadcast Networks With Layered Decoding and Layered Secrecy: Theory and Applications , 2015, Proceedings of the IEEE.
[60] Justin P. Coon,et al. Secrecy Outage Analysis in Random Wireless Networks With Antenna Selection and User Ordering , 2017, IEEE Wireless Communications Letters.
[61] Simon L. Cotton,et al. Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..
[62] Caijun Zhong,et al. Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.