Algorithms for Globally-Optimal Secure Signaling Over Gaussian MIMO Wiretap Channels Under Interference Constraints
暂无分享,去创建一个
Sergey Loyka | Yong Li | Limeng Dong | S. Loyka | Yong Li | Limeng Dong
[1] Ali Bereyhi,et al. Optimal Transmit Antenna Selection for Massive MIMO Wiretap Channels , 2018, IEEE Journal on Selected Areas in Communications.
[2] Ying-Chang Liang,et al. Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks , 2007, IEEE Journal of Selected Topics in Signal Processing.
[3] Zhi Ding,et al. Wireless communications in the era of big data , 2015, IEEE Communications Magazine.
[4] Charalambos D. Charalambous,et al. Optimal Signaling for Secure Communications Over Gaussian MIMO Wiretap Channels , 2016, IEEE Transactions on Information Theory.
[5] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[6] Yuan Liu,et al. Secure Beamforming for Untrusted MISO Cognitive Radio Networks , 2018, IEEE Transactions on Wireless Communications.
[7] Ya-Feng Liu,et al. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.
[8] Octavia A. Dobre,et al. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[9] Can Emre Koksal,et al. Physical-Layer Security in TDD Massive MIMO , 2018, IEEE Transactions on Information Theory.
[10] Yong Li,et al. The Secrecy Capacity of Gaussian MIMO Wiretap Channels Under Interference Constraints , 2018, IEEE Journal on Selected Areas in Communications.
[11] Rafael F. Schaefer,et al. The Secrecy Capacity of Compound Gaussian MIMO Wiretap Channels , 2015, IEEE Transactions on Information Theory.
[12] Shlomo Shamai,et al. Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[13] Fredrik Tufvesson,et al. 5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice , 2017, IEEE Journal on Selected Areas in Communications.
[14] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.
[15] H. Vincent Poor,et al. Optimal Beamforming for Gaussian MIMO Wiretap Channels With Two Transmit Antennas , 2017, IEEE Transactions on Wireless Communications.
[16] Giovanni Geraci,et al. Beamforming With Artificial Noise for Secure MISOME Cognitive Radio Transmissions , 2018, IEEE Transactions on Information Forensics and Security.
[17] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[18] Charalambos D. Charalambous,et al. An Algorithm for Global Maximization of Secrecy Rates in Gaussian MIMO Wiretap Channels , 2015, IEEE Transactions on Communications.
[19] Sergey Loyka,et al. The Capacity of Gaussian MIMO Channels Under Total and Per-Antenna Power Constraints , 2016, IEEE Transactions on Communications.
[20] Fuzhen Zhang. Matrix Theory: Basic Results and Techniques , 1999 .
[21] Holger Boche,et al. Information Theoretic Security and Privacy of Information Systems , 2017 .
[22] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[23] Tolga M. Duman,et al. An Overview of Physical Layer Security With Finite-Alphabet Signaling , 2018, IEEE Communications Surveys & Tutorials.
[24] Yang Yang,et al. Robust MIMO Cognitive Radio Systems Under Interference Temperature Constraints , 2013, IEEE Journal on Selected Areas in Communications.
[25] S. Vavasis. COMPLEXITY ISSUES IN GLOBAL OPTIMIZATION: A SURVEY , 1995 .
[26] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[27] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[28] J. Magnus,et al. Matrix Differential Calculus with Applications in Statistics and Econometrics , 1991 .
[29] Martin Haardt,et al. Secrecy rate maximization for MIMO Gaussian wiretap channels with multiple eavesdroppers via alternating matrix POTDC , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[30] 丸山 徹. Convex Analysisの二,三の進展について , 1977 .
[31] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[32] Mai H. Vu,et al. MISO Capacity with Per-Antenna Power Constraint , 2010, IEEE Transactions on Communications.
[33] Charalambos D. Charalambous,et al. Rank-Deficient Solutions for Optimal Signaling Over Wiretap MIMO Channels , 2016, IEEE Transactions on Communications.
[34] Shuguang Cui,et al. On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[35] Geoffrey Ye Li,et al. An Overview of Massive MIMO: Benefits and Challenges , 2014, IEEE Journal of Selected Topics in Signal Processing.
[36] Sergey Loyka,et al. Optimal Full-Rank Signaling Over MIMO Wiretap Channels Under Interference Constraint , 2018, IEEE Wireless Communications Letters.
[37] Katta G. Murty,et al. Some NP-complete problems in quadratic and nonlinear programming , 1987, Math. Program..
[38] Yingbin Liang,et al. Secure Communications via Physical-Layer and Information-Theoretic Techniques [Scanning the Issue] , 2015, Proc. IEEE.
[39] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[40] Yonggang Wen,et al. Cloud radio access network (C-RAN): a primer , 2015, IEEE Network.
[41] Yurii Nesterov,et al. Introductory Lectures on Convex Optimization - A Basic Course , 2014, Applied Optimization.
[42] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[43] H. Vincent Poor,et al. On Gaussian MIMO BC-MAC duality with multiple transmit covariance constraints , 2008, 2009 IEEE International Symposium on Information Theory.
[44] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[45] Bayan S. Sharif,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.
[46] Yong Li,et al. An algorithm for optimal secure signaling over cognitive radio MIMO channels , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[47] Xuelong Li,et al. Recent Advances in Cloud Radio Access Networks: System Architectures, Key Techniques, and Open Issues , 2016, IEEE Communications Surveys & Tutorials.
[48] Giuseppe Caire,et al. Multiuser MISO Transmitter Optimization for Intercell Interference Mitigation , 2009, IEEE Transactions on Signal Processing.
[49] H. Vincent Poor,et al. Secrecy Rate Maximization in Gaussian MIMO Wiretap Channels , 2017 .
[50] Qiang Li,et al. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.