Information Leakage Neutralization for the Multi-Antenna Non-Regenerative Relay-Assisted Multi-Carrier Interference Channel
暂无分享,去创建一个
[1] A. Wittneben,et al. Cooperative Distributed Multiuser MMSE Relaying in Wireless Ad-Hoc Networks , 2005, Conference Record of the Thirty-Ninth Asilomar Conference onSignals, Systems and Computers, 2005..
[2] Armin Wittneben,et al. Spectral efficient protocols for half-duplex fading relay channels , 2007, IEEE Journal on Selected Areas in Communications.
[3] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.
[4] Il-Min Kim,et al. Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.
[5] Suhas N. Diggavi,et al. Approximate capacity of a class of Gaussian relay-interference networks , 2009, 2009 IEEE International Symposium on Information Theory.
[6] Abbas El Gamal,et al. Relay Networks With Delays , 2007, IEEE Transactions on Information Theory.
[7] H. Vincent Poor,et al. Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.
[8] Eduard A. Jorswieck,et al. Efficient information leakage neutralization on a relay-assisted multi-carrier interference channel , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[9] Friedemann Mattern. Wireless Future: Ubiquitous Computing , 2004 .
[10] Raef Bassily,et al. Secure communication in multiple relay networks through decode-and-forward strategies , 2012, Journal of Communications and Networks.
[11] Suhas N. Diggavi,et al. Transmission techniques for relay-interference networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[12] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[13] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[14] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[15] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[16] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[17] Stefan Berger,et al. Recent advances in amplify-and-forward two-hop relaying , 2009, IEEE Communications Magazine.
[18] Björn E. Ottersten,et al. Non-regenerative two-hop wiretap channels using interference neutralization , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[19] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[20] Raef Bassily,et al. Deaf Cooperation for Secrecy With Multiple Antennas at the Helper , 2012, IEEE Transactions on Information Forensics and Security.
[21] Hamid Jafarkhani,et al. Cooperative Jamming and Power Allocation for Wireless Relay Networks in Presence of Eavesdropper , 2011, 2011 IEEE International Conference on Communications (ICC).
[22] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[23] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[24] RankovBoris,et al. Spectral efficient protocols for half-duplex fading relay channels , 2007 .
[25] H. Vincent Poor,et al. Information and inference in the wireless physical layer , 2012, IEEE Wireless Communications.
[26] A. El Gamal,et al. Relay-without-delay , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[27] Syed Ali Jafar,et al. Degrees of Freedom of Wireless Networks With Relays, Feedback, Cooperation, and Full Duplex Operation , 2009, IEEE Transactions on Information Theory.
[28] Derrick Wing Kwan Ng,et al. Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.
[29] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[30] Eduard A. Jorswieck,et al. Instantaneous Relaying: Optimal Strategies and Interference Neutralization , 2012, IEEE Transactions on Signal Processing.
[31] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[32] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[33] Farshad Lahouti,et al. Link adaptation for fixed relaying with untrusted relays: Transmission strategy design and performance analysis , 2011, 2011 18th International Conference on Telecommunications.
[34] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[35] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[36] Namyoon Lee,et al. Aligned Interference Neutralization and the Degrees of Freedom of the 2 User Interference Channel with Instantaneous Relay , 2011, ArXiv.
[37] Eduard A. Jorswieck,et al. Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.