Enhancing PHY Security of Cooperative Cognitive Radio Multicast Communications
暂无分享,去创建一个
George K. Karagiannidis | Trung Q. Duong | Arumugam Nallanathan | Van-Dinh Nguyen | Oh-Soon Shin | G. Karagiannidis | T. Duong | A. Nallanathan | Oh-Soon Shin | Van-Dinh Nguyen | T. Duong
[1] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[2] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[3] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[4] George K. Karagiannidis,et al. Robust beamforming for secrecy rate in cooperative cognitive radio multicast communications , 2017, 2017 IEEE International Conference on Communications (ICC).
[5] Sven Strauss,et al. Convex Analysis And Global Optimization , 2016 .
[6] Tiep Minh Hoang,et al. Secrecy Capacity of the Primary System in a Cognitive Radio Network , 2015, IEEE Transactions on Vehicular Technology.
[7] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[8] Qiang Li,et al. Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.
[9] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[10] Reza Khosravi-Farsani,et al. Capacity theorems for the Cognitive Radio Channel with confidential messages , 2014, 2014 IEEE International Symposium on Information Theory.
[11] Saeedeh Parsaeefard,et al. Cooperative Secure Resource Allocation in Cognitive Radio Networks with Guaranteed Secrecy Rate for Primary Users , 2014, IEEE Transactions on Wireless Communications.
[12] Lars K. Rasmussen,et al. Cooperation for secure broadcasting in cognitive radio networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[13] Octavia A. Dobre,et al. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks , 2016, IEEE Transactions on Information Forensics and Security.
[14] Arkadi Nemirovski,et al. Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.
[15] Mohammad Reza Aref,et al. Cognitive interference channel with two confidential messages , 2010, 2010 International Symposium On Information Theory & Its Applications.
[16] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[17] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[18] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[19] Shlomo Shamai,et al. Compound Wiretap Channels , 2009, EURASIP J. Wirel. Commun. Netw..
[20] Trung Quang Duong,et al. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[21] Santhanakrishnan Anand,et al. On the Location of an Eavesdropper in Multiterminal Networks , 2010, IEEE Transactions on Information Forensics and Security.
[22] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[23] A. Lee Swindlehurst,et al. Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[24] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[25] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[26] Shlomo Shamai,et al. Capacity of Cognitive Interference Channels With and Without Secrecy , 2009, IEEE Transactions on Information Theory.
[27] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[28] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[29] Jamie S. Evans,et al. Secrecy rate maximization for cooperative overlay cognitive radio networks with artificial noise , 2014, 2014 IEEE International Conference on Communications (ICC).
[30] J. Lasserre. A trace inequality for matrix product , 1995, IEEE Trans. Autom. Control..
[31] Abbas El Gamal,et al. Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).
[32] Fengchao Zhu,et al. Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming , 2016, IEEE Transactions on Vehicular Technology.
[33] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[34] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[35] Kim-Chuan Toh,et al. SDPT3 -- A Matlab Software Package for Semidefinite Programming , 1996 .
[36] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[37] Trung Quang Duong,et al. Physical Layer Security for Primary System: A Symbiotic Approach in Cooperative Cognitive Radio Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[38] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[39] Jinhong Yuan,et al. On the target secrecy rate for SISOME wiretap channels , 2014, 2014 IEEE International Conference on Communications (ICC).
[40] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[41] H. Vincent Poor,et al. Spectral and Energy Efficiencies in Full-Duplex Wireless Information and Power Transfer , 2017, IEEE Transactions on Communications.
[42] Aharon Ben-Tal,et al. Lectures on modern convex optimization , 1987 .
[43] Gordon P. Wright,et al. Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..
[44] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[45] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[46] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).