Robust Secure Transmission of Using Main-Lobe-Integration-Based Leakage Beamforming in Directional Modulation MU-MIMO Systems
暂无分享,去创建一个
Jun Li | Feng Shu | Wei Zhu | Xiangwei Zhou | Jinhui Lu | Jun Yu Li | F. Shu | Xiangwei Zhou | Wei Zhu | Jinhui Lu
[1] Victor C. M. Leung,et al. Anti-Eavesdropping Schemes for Interference Alignment (IA)-Based Wireless Networks , 2016, IEEE Transactions on Wireless Communications.
[2] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[3] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[4] C.-C. Jay Kuo,et al. Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems , 2013, Springer Briefs in Electrical and Computer Engineering.
[5] Mianxiong Dong,et al. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[6] Hsiao-Hwa Chen,et al. Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.
[7] Yuan Ding,et al. A Vector Approach for the Analysis and Synthesis of Directional Modulation Transmitters , 2014, IEEE Transactions on Antennas and Propagation.
[8] Jun Li,et al. Robust Synthesis Method for Secure Directional Modulation With Imperfect Direction Angle , 2016, IEEE Communications Letters.
[9] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[10] Ali H. Sayed,et al. A Leakage-Based Precoding Scheme for Downlink Multi-User MIMO Channels , 2007, IEEE Transactions on Wireless Communications.
[11] Xiaofeng Tao,et al. Ergodic Secrecy Sum-Rate for Downlink Multiuser MIMO Systems With Limited CSI Feedback , 2014, IEEE Communications Letters.
[12] Feng Xia,et al. Social-Oriented Adaptive Transmission in Opportunistic Internet of Smartphones , 2017, IEEE Transactions on Industrial Informatics.
[13] F. Gross. Smart Antennas for Wireless Communications: With MATLAB , 2005 .
[14] A. Hajimiri,et al. Transmitter Architectures Based on Near-Field Direct Antenna Modulation , 2008, IEEE Journal of Solid-State Circuits.
[15] Victor C. M. Leung,et al. Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.
[16] Ali H. Sayed,et al. A multi user beamforming scheme for downlink MIMO channels based on maximizing signal-to-leakage ratios , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[17] Wei-Ping Zhu,et al. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems , 2014, IEEE Transactions on Communications.
[18] M. Daly,et al. Directional Modulation Technique for Phased Arrays , 2009, IEEE Transactions on Antennas and Propagation.
[19] Vincent Fusco,et al. Orthogonal Vector Approach for Synthesis of Multi-Beam Directional Modulation Transmitters , 2015, IEEE Antennas and Wireless Propagation Letters.
[20] Feng Xia,et al. CAIS: A Copy Adjustable Incentive Scheme in Community-Based Socially Aware Networking , 2017, IEEE Transactions on Vehicular Technology.
[21] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[22] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.
[23] Xiaohu You,et al. Adaptive robust Max-SLNR precoder for MU-MIMO-OFDM systems with imperfect CSI , 2016, Science China Information Sciences.
[24] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[25] Erica L. Daly,et al. Demonstration of Directional Modulation Using a Phased Array , 2010, IEEE Transactions on Antennas and Propagation.
[26] Matthew R. McKay,et al. Physical layer security with artificial noise: Secrecy capacity and optimal power allocation , 2009, 2009 3rd International Conference on Signal Processing and Communication Systems.
[27] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[28] Vincent Fusco,et al. Directional Modulation Far-field Pattern Separation Synthesis Approach , 2015 .
[29] Xiao Liu,et al. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs , 2017, Sensors.
[30] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[31] Michael Mao Wang,et al. An Efficient Power Allocation Scheme for Leakage-Based Precoding in Multi-Cell Multiuser MIMO Downlink , 2011, IEEE Communications Letters.
[32] Jia Zhu,et al. Physical-Layer Security for Cooperative Relay Networks , 2016, Wireless Networks.
[33] Feng Shu,et al. Robust Synthesis Scheme for Secure Multi-Beam Directional Modulation in Broadcasting Systems , 2016, IEEE Access.
[34] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[35] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .