Joint Design of Massive MIMO Precoder and Security Scheme for Multiuser Scenarios under Reciprocal Channel Conditions
暂无分享,去创建一个
[1] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[2] Geoffrey Ye Li,et al. An Overview of Massive MIMO: Benefits and Challenges , 2014, IEEE Journal of Selected Topics in Signal Processing.
[3] Bruce Schneier,et al. Cryptographic Design Vulnerabilities , 1998, Computer.
[4] Syed Ali Jafar,et al. Interference Alignment and Degrees of Freedom of the $K$-User Interference Channel , 2008, IEEE Transactions on Information Theory.
[5] Marco Gomes,et al. Interleaved Coding for Secrecy with a Hidden Key , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[6] Victor C. M. Leung,et al. Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.
[7] Andrew Thangaraj,et al. Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.
[8] Adão Silva,et al. Retrospective Interference Alignment: Degrees of Freedom Scaling With Distributed Transmitters , 2017, IEEE Transactions on Information Theory.
[9] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[10] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[11] Erik G. Larsson,et al. Massive MIMO for next generation wireless systems , 2013, IEEE Communications Magazine.
[12] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[13] A. Lee Swindlehurst,et al. Cooperative Jamming in MIMO ad-hoc networks , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.
[14] Adão Silva,et al. Exploiting reciprocal channel estimations for jamming to secure wireless communications , 2017, 2017 Wireless Days.
[15] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[16] Victor C. M. Leung,et al. Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.
[17] Marco Gomes,et al. Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime , 2016, IEEE Signal Processing Letters.
[18] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[19] Manjula Sandirigama,et al. Security weaknesses of WEP protocol IEEE 802.11b and enhancing the security with dynamic keys , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[20] Derrick Wing Kwan Ng,et al. Secure Massive MIMO transmission in the presence of an active eavesdropper , 2015, 2015 IEEE International Conference on Communications (ICC).
[21] Georges Kaddoum,et al. A Survey on Cooperative Jamming Applied to Physical Layer Security , 2015, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[22] Il-Min Kim,et al. Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[23] A. Lee Swindlehurst,et al. Millimeter-wave massive MIMO: the next wireless revolution? , 2014, IEEE Communications Magazine.
[24] A. Lee Swindlehurst,et al. Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[25] Lajos Hanzo,et al. Survey of Large-Scale MIMO Systems , 2015, IEEE Communications Surveys & Tutorials.
[26] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[27] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[28] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[29] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.