Physical-Layer Security in Multiuser Visible Light Communication Networks
暂无分享,去创建一个
Liang Yin | Harald Haas | H. Haas | L. Yin
[1] S. Randel,et al. Broadband Information Broadcasting Using LED-Based Interior Lighting , 2008, Journal of Lightwave Technology.
[2] Masao Nakagawa,et al. Fundamental analysis for visible-light communication system using LED lights , 2004, IEEE Transactions on Consumer Electronics.
[3] H. Haas,et al. Information Rate of OFDM-Based Optical Wireless Communication Systems With Nonlinear Distortion , 2013, Journal of Lightwave Technology.
[4] Dominic C. O'Brien,et al. High data rate multiple input multiple output (MIMO) optical wireless communications using white led lighting , 2009, IEEE Journal on Selected Areas in Communications.
[5] Liang Yin,et al. Performance Evaluation of Non-Orthogonal Multiple Access in Visible Light Communication , 2016, IEEE Transactions on Communications.
[6] Svilen Dimitrov,et al. Principles of LED Light Communications: Towards Networked Li-Fi , 2015 .
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[9] Jeffrey B. Carruthers,et al. Wireless infrared communications , 2003, Proc. IEEE.
[10] Onur Ozan Koyluoglu,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[11] Sennur Ulukus,et al. Gaussian wiretap channel with an amplitude constraint , 2012, 2012 IEEE Information Theory Workshop.
[12] D. Stoyan,et al. Stochastic Geometry and Its Applications , 1989 .
[13] Harald Haas,et al. What is LiFi? , 2015, 2015 European Conference on Optical Communication (ECOC).
[14] Mohamed-Slim Alouini,et al. Free-Space Optical Communications: Capacity Bounds, Approximations, and a New Sphere-Packing Perspective , 2016, IEEE Transactions on Communications.
[15] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part II: Maximum Rate and Collusion , 2012, IEEE Transactions on Information Forensics and Security.
[16] Lutz H.-J. Lampe,et al. Physical-Layer Security for MISO Visible Light Communication Channels , 2015, IEEE Journal on Selected Areas in Communications.
[17] Zhiguo Ding,et al. On Secure VLC Systems With Spatially Random Terminals , 2017, IEEE Communications Letters.
[18] Dominic C. O'Brien,et al. Wireless Myths, Realities, and Futures: From 3G/4G to Optical and Quantum Wireless , 2012, Proceedings of the IEEE.
[19] Xiangyun Zhou,et al. Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.
[20] Lutz H.-J. Lampe,et al. Optimal and Robust Beamforming for Secure Transmission in MISO Visible-Light Communication Links , 2016, IEEE Transactions on Signal Processing.
[21] Amos Lapidoth,et al. On the Capacity of Free-Space Optical Intensity Channels , 2008, IEEE Transactions on Information Theory.
[22] Jiangzhou Wang,et al. Tight Bounds on Channel Capacity for Dimmable Visible Light Communications , 2013, Journal of Lightwave Technology.
[23] Martin Haenggi,et al. Distance Distributions in Finite Uniformly Random Networks: Theory and Applications , 2008, IEEE Transactions on Vehicular Technology.
[24] Jeffrey G. Andrews,et al. On the Throughput Cost of Physical Layer Security in Decentralized Wireless Networks , 2010, IEEE Transactions on Wireless Communications.
[25] Lutz H.-J. Lampe,et al. Coordinated Broadcasting for Multiuser Indoor Visible Light Communication Systems , 2015, IEEE Transactions on Communications.
[26] Ananthram Swami,et al. PHY Layer Security Based on Protected Zone and Artificial Noise , 2013, IEEE Signal Processing Letters.
[27] Can Emre Koksal,et al. On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.
[28] Moe Z. Win,et al. Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.
[29] Martin Haenggi,et al. On distances in uniformly random networks , 2005, IEEE Transactions on Information Theory.
[30] Lajos Hanzo,et al. Users First: User-Centric Cluster Formation for Interference-Mitigation in Visible-Light Networks , 2016, IEEE Transactions on Wireless Communications.
[31] Stefan Videv,et al. Fractional Frequency Reuse in DCO-OFDM-Based Optical Attocell Networks , 2015, Journal of Lightwave Technology.
[32] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[33] Martin Haenggi. The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.