Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee
暂无分享,去创建一个
[1] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[2] Xiaoming Chen,et al. Efficient Resource Allocation in a Rateless-Coded MU-MIMO Cognitive Radio Network With QoS Provisioning and Limited Feedback , 2013, IEEE Transactions on Vehicular Technology.
[3] Zhi Ding,et al. On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.
[4] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[5] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[6] Gerhard Fettweis,et al. Green Resource Allocation to Minimize Receiving Energy in OFDMA Cellular Systems , 2012, IEEE Communications Letters.
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] I. Stancu-Minasian. Nonlinear Fractional Programming , 1997 .
[9] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[10] Derrick Wing Kwan Ng,et al. Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.
[11] Vincent K. N. Lau,et al. Cross-Layer Design for OFDMA Wireless Systems With Heterogeneous Delay Requirements , 2007, IEEE Transactions on Wireless Communications.
[12] Chao Wang,et al. Adaptive Mode Selection for Multiuser MIMO Downlink Employing Rateless Codes with QoS Provisioning , 2012, IEEE Transactions on Wireless Communications.
[13] Hyundong Shin,et al. Power Allocation and Achievable Secrecy Rates in MISOME Wiretap Channels , 2011, IEEE Communications Letters.
[14] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.