Security protection over wireless fading channels by exploiting frequency selectivity
暂无分享,去创建一个
Li Sun | Pinyi Ren | Qinghe Du | Mukhtar Hussain | Li Sun | Pinyi Ren | Mukhtar Hussain | Qinghe Du
[1] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[2] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[3] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[4] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[5] Xianbin Wang,et al. Eavesdropping-Resilient OFDM System Using Sorted Subcarrier Interleaving , 2015, IEEE Transactions on Wireless Communications.
[6] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[7] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[8] Mohsen Guizani,et al. Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.
[9] B. P. Lathi,et al. Modern Digital and Analog Communication Systems , 1983 .
[10] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[11] Willie K. Harrison,et al. Parity modifications and stopping sets in high-rate codes for physical-layer security , 2014, 2014 IEEE Conference on Communications and Network Security.
[12] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[13] Li Sun,et al. Security enhancement for video transmission via noise aggregation in immersive systems , 2015, Multimedia Tools and Applications.
[14] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[15] William H. Tranter,et al. Principles of Communication Systems Simulation with Wireless Applications , 2004 .
[16] Zhi Xue,et al. Robust MIMO beamforming and power allocation for artificial noise generated by both transmitter and receiver , 2014, 9th International Conference on Communications and Networking in China.
[17] Bingli Jiao,et al. Artificial-noise strategy for single-antenna systems over multi-path fading channels , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[18] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[19] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[20] Li Sun,et al. On achievable secrecy rate by noise aggregation over wireless fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).
[21] Wenbo Wang,et al. Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation , 2012, Journal of Communications and Networks.
[22] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[23] Li Sun,et al. Exploiting Fountain Codes for Secure Wireless Delivery , 2014, IEEE Communications Letters.
[24] Hüseyin Arslan,et al. Achieving secure communication through pilot manipulation , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[25] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.