Performance Analysis of Wireless Information Surveillance in Machine-Type Communication at Finite Blocklength Regime
暂无分享,去创建一个
[1] Caijun Zhong,et al. Performance of Proactive Eavesdropping in Dual-Hop Relaying Systems , 2017, 2017 IEEE Globecom Workshops (GC Wkshps).
[2] Rui Zhang,et al. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.
[3] James Gross,et al. Blocklength-Limited Performance of Relaying Under Quasi-Static Rayleigh Channels , 2016, IEEE Transactions on Wireless Communications.
[4] Haijun Zhang,et al. Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links , 2019, IEEE Transactions on Vehicular Technology.
[5] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[6] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[7] Yichen Wang,et al. Achieving Full Secrecy Rate With Energy-Efficient Transmission Control , 2017, IEEE Transactions on Communications.
[8] Aiwei Sun,et al. Secrecy Performance Analysis of Cognitive Sensor Radio Networks with an EH-Based Eavesdropper , 2017, Sensors.
[9] Xing Tan,et al. A full-duplex SWIPT relaying protocol based on discrete energy state , 2017, 2017 20th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[10] Jie Xu,et al. Transmit Optimization for Symbol-Level Spoofing with BPSK Signaling , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[11] Caijun Zhong,et al. Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.
[12] Petar Popovski,et al. Towards Massive, Ultra-Reliable, and Low-Latency Wireless Communication with Short Packets , 2015 .
[13] He Chen,et al. Wireless Information Surveillance and Intervention Over Multiple Suspicious Links , 2018, IEEE Signal Processing Letters.
[14] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[15] Jie Xu,et al. Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.
[16] Giuseppe Durisi,et al. Quasi-Static Multiple-Antenna Fading Channels at Finite Blocklength , 2013, IEEE Transactions on Information Theory.
[17] Jie Xu,et al. Wireless surveillance of two-hop communications : (Invited paper) , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[18] Jie Xu,et al. Wireless Surveillance of Two-Hop Communications , 2017, ArXiv.
[19] Beongku An,et al. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks , 2017, Sensors.
[20] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.
[21] Zhigang Jin,et al. The Physical Layer Security Experiments of Cooperative Communication System with Different Relay Behaviors , 2017, Sensors.
[22] Jie Xu,et al. Transmit Optimization for Symbol-Level Spoofing , 2018, IEEE Transactions on Wireless Communications.
[23] Yueming Cai,et al. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks , 2018, Sensors.
[24] Jie Xu,et al. Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.
[25] Jie Xu,et al. Fundamental Rate Limits of Physical Layer Spoofing , 2017, IEEE Wireless Communications Letters.
[26] Nan Yang,et al. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming , 2016, Sensors.
[27] Hans-Jurgen Zepernick,et al. Proactive attack: A strategy for legitimate eavesdropping , 2016, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).
[28] Song Han,et al. Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.
[29] Caijun Zhong,et al. Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.