Secure degrees of freedom of MIMO X-channels with output feedback and delayed CSI
暂无分享,去创建一个
Shlomo Shamai | Luc Vandendorpe | Abdellatif Zaidi | Zohaib Hassan Awan | L. Vandendorpe | S. Shamai | Z. Awan | A. Zaidi
[1] Shlomo Shamai,et al. Secrecy Degrees of Freedom of MIMO Broadcast Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.
[2] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[3] Syed Ali Jafar,et al. On the secure degrees of freedom of wireless X networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[4] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[5] Amir K. Khandani,et al. On the degrees of freedom of three-user MIMO broadcast channel with delayed CSIT , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[6] Amir K. Khandani,et al. On the Degrees of Freedom of K-User SISO Interference and X Channels With Delayed CSIT , 2011, IEEE Transactions on Information Theory.
[7] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009, 2009 IEEE International Symposium on Information Theory.
[8] H. Vincent Poor,et al. Interference Alignment for Secrecy , 2008, IEEE Transactions on Information Theory.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[11] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[12] Shlomo Shamai,et al. Retrospective Interference Alignment Over Interference Networks , 2012, IEEE Journal of Selected Topics in Signal Processing.
[13] Amir K. Khandani,et al. Interference Alignment for the MIMO Interference Channel with Delayed Local CSIT , 2011, ArXiv.
[14] Luc Vandendorpe,et al. Multiaccess Channel With Partially Cooperating Encoders and Security Constraints , 2012, IEEE Transactions on Information Forensics and Security.
[15] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .
[16] Shlomo Shamai,et al. Degrees of Freedom Region of the MIMO Interference Channel With Output Feedback and Delayed CSIT , 2011, IEEE Transactions on Information Theory.
[17] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[18] Mahesh K. Varanasi,et al. The degrees of freedom region of the two-user MIMO broadcast channel with delayed CSIT , 2010, 2011 IEEE International Symposium on Information Theory Proceedings.
[19] Roy D. Yates,et al. Secrecy capacity region of a class of one-sided interference channel , 2008, 2008 IEEE International Symposium on Information Theory.
[20] Onur Ozan Koyluoglu,et al. Cooperative Encoding for Secrecy in Interference Channels , 2011, IEEE Transactions on Information Theory.
[21] Hua Sun,et al. Topological interference management with alternating connectivity , 2013, 2013 IEEE International Symposium on Information Theory.
[22] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[23] Luc Vandendorpe,et al. On secure transmission over parallel relay eavesdropper channel , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[24] Amir K. Khandani,et al. On the degrees of freedom of MIMO X channel with delayed CSIT , 2011, 2012 IEEE International Symposium on Information Theory Proceedings.
[25] Shlomo Shamai,et al. Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT , 2013, IEEE Transactions on Information Forensics and Security.
[26] Amir K. Khandani,et al. On the Secure Degrees-of-Freedom of the Multiple-Access-Channel , 2010, ArXiv.
[27] Luc Vandendorpe,et al. Secure Communication Over Parallel Relay Channel , 2010, IEEE Transactions on Information Forensics and Security.
[28] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[29] Mahesh K. Varanasi,et al. The Degrees of Freedom Regions of MIMO Broadcast, Interference, and Cognitive Radio Channels with No CSIT , 2009, ArXiv.
[30] Wei Zhang,et al. On Achievable Degrees of Freedom for MIMO X Channels , 2012, ArXiv.
[31] Mahesh K. Varanasi,et al. The Degrees of Freedom Region and Interference Alignment for the MIMO Interference Channel With Delayed CSIT , 2011, IEEE Transactions on Information Theory.
[32] Shlomo Shamai,et al. New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages , 2011, IEEE Transactions on Information Theory.
[33] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[34] AbdoliMohammad Javad,et al. On the Degrees of Freedom of K-User SISO Interference and X Channels With Delayed CSIT , 2013 .
[35] Syed A. Jafar,et al. Interference Alignment: A New Look at Signal Dimensions in a Communication Network , 2011, Found. Trends Commun. Inf. Theory.
[36] Mohammad Ali Maddah-Ali,et al. Completely Stale Transmitter Channel State Information is Still Very Useful , 2010, IEEE Transactions on Information Theory.
[37] Shlomo Shamai,et al. On X-channels with feedback and delayed CSI , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[38] Luc Vandendorpe,et al. On multiaccess channel with unidirectional cooperation and security constraints , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[39] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[40] Syed Ali Jafar,et al. Index coding: An interference alignment perspective , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[41] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[42] Shlomo Shamai,et al. Degrees of Freedom Region of the MIMO $X$ Channel , 2008, IEEE Transactions on Information Theory.