Sum secrecy rate maximization for multi-carrier MIMOME systems with full-duplex jamming
暂无分享,去创建一个
[1] N. K. Shankaranarayanan,et al. Full- or half-duplex? A capacity analysis with bounded radio resources , 2012, 2012 IEEE Information Theory Workshop.
[2] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[3] Zhi Chen,et al. A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.
[4] A. Lee Swindlehurst,et al. A full-duplex active eavesdropper in mimo wiretap channels: Construction and countermeasures , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[5] Ashutosh Sabharwal,et al. JointNull : Combining Reconfigurable Analog Cancellation with Transmit Beamforming for Large-antenna Full-duplex Wireless , 2017 .
[6] Ananthanarayanan Chockalingam,et al. Sum Secrecy Rate in MISO Full-Duplex Wiretap Channel with Imperfect CSI , 2013, 2015 IEEE Globecom Workshops (GC Wkshps).
[7] Stephen P. Boyd,et al. Graph Implementations for Nonsmooth Convex Programs , 2008, Recent Advances in Learning and Control.
[8] Kaare Brandt Petersen,et al. The Matrix Cookbook , 2006 .
[9] Chong-Yung Chi,et al. Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.
[10] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[11] Philip Levis,et al. Achieving single channel, full duplex wireless communication , 2010, MobiCom.
[12] Rudolf Mathar,et al. Joint power and beam optimization in a multi-carrier MIMO wiretap channel with Full-Duplex jammer , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
[13] Derrick Wing Kwan Ng,et al. Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.
[14] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[15] Halim Yanikomeroglu,et al. Secure Robust Resource Allocation in the Presence of Active Eavesdroppers Using Full-Duplex Receivers , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).
[16] Risto Wichman,et al. In-Band Full-Duplex Wireless: Challenges and Opportunities , 2013, IEEE Journal on Selected Areas in Communications.
[17] Ashutosh Sabharwal,et al. Experiment-Driven Characterization of Full-Duplex Wireless Systems , 2011, IEEE Transactions on Wireless Communications.
[18] H. Vincent Poor,et al. Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.
[19] Mounir Ghogho,et al. Physical layer security of MIMO-OFDM systems by beamforming and artificial noise generation , 2011, Phys. Commun..
[20] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[21] Mohanad Obeed,et al. Efficient algorithms for physical layer security in two-way relay systems , 2018, Phys. Commun..
[22] Dimitri P. Bertsekas,et al. Nonlinear Programming , 1997 .
[23] Yiming Ma,et al. A Method for Broadband Full-Duplex MIMO Radio , 2012, IEEE Signal Processing Letters.
[24] Philip Schniter,et al. Full-Duplex Bidirectional MIMO: Achievable Rates Under Limited Dynamic Range , 2012, IEEE Transactions on Signal Processing.
[26] Ashutosh Sabharwal,et al. SoftNull: Many-Antenna Full-Duplex Wireless via Digital Beamforming , 2015, IEEE Transactions on Wireless Communications.
[27] Rudolf Mathar,et al. Hardware Impairments Aware Transceiver Design for Bidirectional Full-Duplex MIMO OFDM Systems , 2017, IEEE Transactions on Vehicular Technology.
[28] Eduard A. Jorswieck,et al. Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.
[29] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[30] Sachin Katti,et al. Full duplex radios , 2013, SIGCOMM.
[31] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.
[32] Il-Min Kim,et al. Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.
[33] Garimella Rama Murthy,et al. Full-duplex communication for future wireless networks: Dynamic resource block allocation approach , 2016, Phys. Commun..
[34] Zhi Xue,et al. Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization , 2014, IEEE Signal Processing Letters.
[35] Narayan Prasad,et al. On Robust Weighted-Sum Rate Maximization in MIMO Interference Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[36] Philip Levis,et al. Applications of self-interference cancellation in 5G and beyond , 2014, IEEE Communications Magazine.
[37] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[38] Sachin Katti,et al. Full Duplex MIMO Radios , 2014, NSDI.
[39] Stephen P. Boyd,et al. Determinant Maximization with Linear Matrix Inequality Constraints , 1998, SIAM J. Matrix Anal. Appl..
[40] Tho Le-Ngoc,et al. Full-duplex relay with jamming protocol for improving physical-layer security , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[41] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[42] Ashutosh Sabharwal,et al. Full-duplex wireless communications using off-the-shelf radios: Feasibility and first results , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[43] Philip Levis,et al. Practical, real-time, full duplex wireless , 2011, MobiCom.
[44] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[45] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[46] R. Hunger. Floating Point Operations in Matrix-Vector Calculus , 2022 .