Optimal Pilots for Anti-Eavesdropping Channel Estimation
暂无分享,去创建一个
[1] Fan Li,et al. Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel , 2019, IEEE Transactions on Information Forensics and Security.
[2] Yingbo Hua,et al. Advanced Properties of Full-Duplex Radio for Securing Wireless Network , 2019, IEEE Transactions on Signal Processing.
[3] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[4] Xiangyun Zhou,et al. Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver , 2018, IEEE Transactions on Information Forensics and Security.
[5] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[6] Eduard A. Jorswieck,et al. Secret key generation from reciprocal spatially correlated MIMO channels , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[7] Xiqi Gao,et al. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead , 2018, IEEE Journal on Selected Areas in Communications.
[8] Emil Björnson,et al. A Framework for Training-Based Estimation in Arbitrarily Correlated Rician MIMO Channels With Rician Disturbance , 2010, IEEE Transactions on Signal Processing.
[9] H. Vincent Poor,et al. A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.
[10] M. Fiedler. Bounds for the determinant of the sum of hermitian matrices , 1971 .
[11] Stark C. Draper,et al. Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent , 2012, IEEE Transactions on Information Theory.
[12] Yao-Win Peter Hong,et al. On the Role of Artificial Noise in Training and Data Transmission for Secret Communications , 2015, IEEE Transactions on Information Forensics and Security.
[13] I. Olkin,et al. Inequalities: Theory of Majorization and Its Applications , 1980 .
[14] Ingram Olkin,et al. Inequalities: Theory of Majorization and Its Application , 1979 .
[15] Xiangyun Zhou,et al. A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems , 2014, IEEE Transactions on Communications.
[16] Ashish Khisti,et al. Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion , 2016, IEEE Transactions on Information Theory.
[17] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[18] Qi Xiong,et al. Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme , 2016, IEEE Transactions on Information Forensics and Security.
[19] Yingbo Hua,et al. Secrecy Analyses of a Full-Duplex MIMOME Network , 2019, IEEE Transactions on Signal Processing.
[20] Michael A. Jensen,et al. Maximization of the Channel-Based Key Establishment Rate in MIMO Systems , 2015, IEEE Transactions on Wireless Communications.
[22] Derrick Wing Kwan Ng,et al. Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.
[23] Xiangyun Zhou,et al. Two-Way Training for Discriminatory Channel Estimation in Wireless MIMO Systems , 2011, IEEE Transactions on Signal Processing.