Secrecy Analyses of a Full-Duplex MIMOME Network
暂无分享,去创建一个
Yingbo Hua | Qiping Zhu | Reza Sohrabi | Y. Hua | Qiping Zhu | R. Sohrabi
[1] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[2] Helmut Bölcskei,et al. Characterizing the statistical properties of mutual information in MIMO channels: insights into diversity-multiplexing tradeoff , 2002, Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems and Computers, 2002..
[3] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[4] Athina P. Petropulu,et al. On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.
[5] Yingbo Hua,et al. Advanced Properties of Full-Duplex Radio for Securing Wireless Network , 2019, IEEE Transactions on Signal Processing.
[6] A. Lee Swindlehurst,et al. Fixed-rate power allocation strategies for enhanced secrecy in MIMO wiretap channels , 2009, 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications.
[7] Yingbo Hua,et al. Fundamental Properties of Full-Duplex Radio for Secure Wireless Communications , 2017, ArXiv.
[8] A. Lee Swindlehurst,et al. Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[9] Hyundong Shin,et al. MIMO Networks: The Effects of Interference , 2008, IEEE Transactions on Information Theory.
[10] Ken Kreutz-Delgado,et al. The Complex Gradient Operator and the CR-Calculus ECE275A - Lecture Supplement - Fall 2005 , 2009, 0906.4835.
[11] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[12] Gerd Ascheid,et al. A Joint Optimization Scheme for Artificial Noise and Transmit Filter for Half and Full Duplex Wireless Cyber Physical Systems , 2018, IEEE Transactions on Sustainable Computing.
[13] Lei Chen,et al. Fast Power Allocation for Secure Communication With Full-Duplex Radio , 2017, IEEE Transactions on Signal Processing.
[14] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[15] Hsiao-Hwa Chen,et al. Secrecy Capacity Analysis of Artificial Noisy MIMO Channels—An Approach Based on Ordered Eigenvalues of Wishart Matrices , 2017, IEEE Transactions on Information Forensics and Security.
[16] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[17] Prabhu Babu,et al. A Minorization–Maximization Algorithm for Maximizing the Secrecy Rate of the MIMOME Wiretap Channel , 2017, IEEE Communications Letters.
[18] Thomas M. Cover,et al. Network Information Theory , 2001 .
[19] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[20] Zhi Xue,et al. Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization , 2014, IEEE Signal Processing Letters.
[21] Tharmalingam Ratnarajah,et al. On Ergodic Secrecy Capacity of Random Wireless Networks With Protected Zones , 2016, IEEE Transactions on Vehicular Technology.
[22] Xiaohu You,et al. On the Ergodic Capacity of Rank-$1$ Ricean-Fading MIMO Channels , 2007, IEEE Transactions on Information Theory.
[23] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[24] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[25] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[26] Zhi Chen,et al. A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.
[27] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[28] Hyundong Shin,et al. Closed-form formulas for ergodic capacity of MIMO Rayleigh fading channels , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[29] Alex J. Grant,et al. Rayleigh Fading Multi-Antenna Channels , 2002, EURASIP J. Adv. Signal Process..
[30] Antonia Maria Tulino,et al. Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.
[31] Wade Trappe,et al. Achieving Secret Communication for Fast Rayleigh Fading Channels , 2010, IEEE Transactions on Wireless Communications.
[32] Mohamed-Slim Alouini,et al. Secure Broadcasting With Imperfect Channel State Information at the Transmitter , 2016, IEEE Transactions on Wireless Communications.
[33] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[34] Yingbo Hua,et al. A NEW LOOK AT SECRECY CAPACITY OF MIMOME USING ARTIFICIAL NOISE FROM ALICE AND BOB WITHOUT KNOWLEDGE OF EVE’S CSI , 2018, 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[35] Ami Wiesel,et al. On the Gaussian MIMO Wiretap Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[36] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[37] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[38] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[39] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[40] A. Lee Swindlehurst,et al. Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.
[41] Yi Hong,et al. Artificial Noise Revisited , 2014, IEEE Transactions on Information Theory.
[42] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.