Deep Learning-Based Proactive Eavesdropping for Wireless Surveillance
暂无分享,去创建一个
Inkyu Lee | Jihwan Moon | Hoon Lee | Seunghwan Baek | Sang Hyun Lee | Sang Hyun Lee | Inkyu Lee | Seunghwan Baek | Jihwan Moon | Hoon Lee
[1] Caijun Zhong,et al. Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.
[2] Inkyu Lee,et al. Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing , 2018, IEEE Transactions on Wireless Communications.
[3] Jie Xu,et al. Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).
[4] Jie Xu,et al. Wireless Surveillance of Two-Hop Communications , 2017, ArXiv.
[5] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[6] Jan Cernocký,et al. Improved feature processing for deep neural networks , 2013, INTERSPEECH.
[7] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.
[8] Inkyu Lee,et al. Precoder Designs for MIMO Gaussian Multiple Access Wiretap Channels , 2017, IEEE Transactions on Vehicular Technology.
[9] Inkyu Lee,et al. Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer , 2017, IEEE Transactions on Communications.
[10] Hans-Jurgen Zepernick,et al. Proactive attack: A strategy for legitimate eavesdropping , 2016, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).
[11] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[12] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[13] Qi Zhang,et al. Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.
[14] Caijun Zhong,et al. Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.
[15] Wei Zhao,et al. Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System , 2018, IEEE Access.
[16] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[17] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[18] Jie Xu,et al. Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.
[19] David G. Luenberger,et al. Linear and nonlinear programming , 1984 .
[20] Inkyu Lee,et al. UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.
[21] He Chen,et al. Wireless Information Surveillance and Intervention Over Multiple Suspicious Links , 2018, IEEE Signal Processing Letters.
[22] Tara N. Sainath,et al. Improving deep neural networks for LVCSR using rectified linear units and dropout , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[23] Shlomo Shamai,et al. Fronthaul Compression for Cloud Radio Access Networks: Signal processing advances inspired by network information theory , 2014, IEEE Signal Processing Magazine.
[24] Rui Zhang,et al. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.
[25] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[26] Inkyu Lee,et al. Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming , 2018, IEEE Transactions on Wireless Communications.
[27] Jie Xu,et al. Wireless surveillance of two-hop communications : (Invited paper) , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[28] Liang Liu,et al. Secrecy wireless information and power transfer in fading wiretap channel , 2014, 2014 IEEE International Conference on Communications (ICC).