On the Secrecy Rate and Optimal Power Allocation for Artificial Noise Assisted MIMOME Channels
暂无分享,去创建一个
Il-Min Kim | Sanghun Im | Sangseok Yun | Jeongseok Ha | Il Kim | J. Ha | Sanghun Im | Sangseok Yun
[1] F. Topsøe. Some Bounds for the Logarithmic Function , 2004 .
[2] Armin Straub,et al. Bounds for the logarithm of the Euler gamma function and its derivatives , 2015, 1508.03267.
[3] Bo Wang,et al. Optimal Semiadaptive Transmission With Artificial-Noise-Aided Beamforming in MISO Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[4] Bo Wang,et al. Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint , 2015, IEEE Communications Letters.
[5] D. Harville. Matrix Algebra From a Statistician's Perspective , 1998 .
[6] Namseok Chang,et al. Secrecy Rate for MISO Rayleigh Fading Channels with Relative Distance of Eavesdropper , 2012, IEEE Communications Letters.
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] H. Vincent Poor,et al. Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.
[9] Shihao Yan,et al. Artificial Noise: Transmission Optimization in Multi-Input Single-Output Wiretap Channels , 2015, IEEE Transactions on Communications.
[10] Xin Wang,et al. Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.
[11] Qinye Yin,et al. Artificial-noise-aided beamforming design against a multi-antenna eavesdropper under secrecy outage constraint , 2017, 2017 IEEE International Conference on Communications (ICC).
[12] Yi Hong,et al. Artificial Noise Revisited , 2014, IEEE Transactions on Information Theory.
[13] R. Bellman,et al. A Survey of Matrix Theory and Matrix Inequalities , 1965 .
[14] Trung Quang Duong,et al. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[15] S.M. Moser. Expectations of a noncentral chi-square distribution with application to IID MIMO Gaussian fading , 2008, 2008 International Symposium on Information Theory and Its Applications.
[16] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[17] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[18] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[19] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[20] M. Marcus,et al. A Survey of Matrix Theory and Matrix Inequalities , 1965 .
[21] Thomas L. Marzetta,et al. Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.
[22] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[23] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[24] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[25] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[26] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[27] Babak Hassibi,et al. How much training is needed in multiple-antenna wireless links? , 2003, IEEE Trans. Inf. Theory.