Space–Time Line Code for Enhancing Physical Layer Security of Multiuser MIMO Uplink Transmission
暂无分享,去创建一个
[1] Robert W. Heath,et al. Secure Communications in Millimeter Wave Ad Hoc Networks , 2016, IEEE Transactions on Wireless Communications.
[2] Caijun Zhong,et al. Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation , 2017, IEEE Transactions on Information Forensics and Security.
[3] Xiang Cheng,et al. Secure Massive MIMO Under Imperfect CSI: Performance Analysis and Channel Prediction , 2019, IEEE Transactions on Information Forensics and Security.
[4] Jingon Joung,et al. Space–Time Line Code for Massive MIMO and Multiuser Systems With Antenna Allocation , 2018, IEEE Access.
[5] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[6] Taejoon Kim,et al. Training and Data Structures for AN-Aided Secure Communication , 2019, IEEE Systems Journal.
[7] George K. Karagiannidis,et al. Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.
[8] Jingon Joung,et al. Uneven Power Amplifier Shuffling for Space-Time Line Code Systems , 2018, IEEE Access.
[9] Yuanyuan Yang,et al. Optimal Target Secrecy Rate and Power Allocation Policy for a SWIPT System Over a Fading Wiretap Channel , 2018, IEEE Systems Journal.
[10] Vijay K. Bhargava,et al. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.
[11] Zhi Ding,et al. Blind MIMO channel identification from second order statistics using rank deficient channel convolution matrix , 2003, IEEE Trans. Signal Process..
[12] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[13] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[14] Bang Chul Jung,et al. Machine Learning Based Blind Decoding for Space–Time Line Code (STLC) Systems , 2019, IEEE Transactions on Vehicular Technology.
[15] Naofal Al-Dhahir,et al. Secure Alamouti MAC Transmissions , 2017, IEEE Transactions on Wireless Communications.
[16] Sofiène Affes,et al. Cramer-Rao Lower Bounds for NDA SNR Estimates of Square QAM Modulated Transmissions , 2010, IEEE Transactions on Communications.
[17] Cihan Tepedelenlioglu,et al. SNR estimation for nonconstant modulus constellations , 2005, IEEE Transactions on Signal Processing.
[18] A. Robert Calderbank,et al. Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.
[19] Quanzhong Li,et al. Joint Position, Decoding Order, and Power Allocation Optimization in UAV-Based NOMA Downlink Communications , 2020, IEEE Systems Journal.
[20] Jianhua Ge,et al. Improving Physical-Layer Security for Wireless Communication Systems Using Duality-Aware Two-Way Relay Cooperation , 2019, IEEE Systems Journal.
[21] Xin Wang,et al. Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.
[22] Mohammad Javad Saber,et al. Physical-Layer Security Analysis of Mixed SIMO SWIPT RF and FSO Fixed-Gain Relaying Systems , 2019, IEEE Systems Journal.
[23] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[24] Bang Chul Jung,et al. Space–time line coded regenerative two‐way relay systems with power control , 2019, Electronics Letters.
[25] Hsiao-Hwa Chen,et al. Artificial Noisy MIMO Systems Under Correlated Scattering Rayleigh Fading—A Physical Layer Security Approach , 2019, IEEE Systems Journal.
[26] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[27] Tharmalingam Ratnarajah,et al. Secure Communications through Rayleigh Fading SIMO Channel with Multiple Eavesdroppers , 2010, 2010 IEEE International Conference on Communications.
[28] Huiming Wang,et al. Low-Overhead Distributed Jamming for SIMO Secrecy Transmission with Statistical CSI , 2015, IEEE Signal Processing Letters.
[29] Qian Liu,et al. Secure Hybrid Beamformers Design in mmWave MIMO Wiretap Systems , 2020, IEEE Systems Journal.
[30] Zhi Ding,et al. Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.
[31] Hamid Jafarkhani,et al. Secure space-time block coding via artificial noise alignment , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[32] Gan Zheng,et al. Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes , 2018, IEEE Journal on Selected Areas in Communications.
[33] Hui Yu,et al. Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.
[34] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[35] Derrick Wing Kwan Ng,et al. Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.
[36] Aylin Yener,et al. Providing Secrecy With Structured Codes: Two-User Gaussian Channels , 2014, IEEE Transactions on Information Theory.
[37] Kang An,et al. Secure Communications Over Cell-Free Massive MIMO Networks With Hardware Impairments , 2020, IEEE Systems Journal.
[38] Yangyang Zhang,et al. Probabilistically Robust SWIPT for Secrecy MISOME Systems , 2016, IEEE Transactions on Information Forensics and Security.
[39] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[40] Jihoon Choi,et al. Artificial Noise Injection and Its Power Loading Methods for Secure Space-Time Line Coded Systems , 2019, Entropy.
[41] Qinye Yin,et al. Two-step transmission with artificial noise for secure wireless SIMO communications , 2014, Science China Information Sciences.
[42] Hsiao-Hwa Chen,et al. A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.
[43] Yan Zhang,et al. Secure Transmission for Heterogeneous Cellular Networks With Wireless Information and Power Transfer , 2018, IEEE Systems Journal.
[44] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[45] Qingqing Wu,et al. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.
[46] Sofiène Affes,et al. Closed-Form CRLBs for SNR Estimation From Turbo-Coded BPSK-, MSK-, and Square-QAM-Modulated Signals , 2014, IEEE Transactions on Signal Processing.
[47] Joonhyuk Kang,et al. Secrecy-Aware Altitude Optimization for Quasi-Static UAV Base Station Without Eavesdropper Location Information , 2019, IEEE Communications Letters.
[48] Xiao Ma,et al. Minimum Secrecy Throughput Maximization in Wireless Powered Secure Communications , 2018, IEEE Transactions on Vehicular Technology.
[49] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[50] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[51] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[52] Jingon Joung,et al. Space–Time Line Codes With Power Allocation for Regenerative Two-Way Relay Systems , 2019, IEEE Transactions on Vehicular Technology.
[53] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[54] Jingon Joung,et al. Multiuser Space–Time Line Code With Optimal and Suboptimal Power Allocation Methods , 2018, IEEE Access.
[55] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[56] Tobias J. Oechtering,et al. Polar Coding for Bidirectional Broadcast Channels with Common and Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.
[57] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[58] Jingon Joung,et al. Energy Efficient Space–Time Line Coded Regenerative Two-Way Relay Under Per-Antenna Power Constraints , 2018, IEEE Access.
[59] Robert W. Heath,et al. Interpolation based transmit beamforming for MIMO-OFDM with limited feedback , 2004, IEEE Transactions on Signal Processing.
[60] A. Lee Swindlehurst,et al. On the Optimality of Linear Precoding for Secrecy in the MIMO Broadcast Channel , 2013, IEEE Journal on Selected Areas in Communications.
[61] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[62] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.