Exploiting Opportunistic Scheduling in Uplink Wiretap Networks
暂无分享,去创建一个
[1] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[2] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[3] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[4] Byeong Gi Lee,et al. Wireless packet scheduling based on the cumulative distribution function of user transmission rates , 2005, IEEE Transactions on Communications.
[5] Moustafa Youssef,et al. Opportunistic Secrecy with a Strict Delay Constraint , 2013, IEEE Transactions on Communications.
[6] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[7] Hsiao-Hwa Chen,et al. Interference-Limited Resource Optimization in Cognitive Femtocells With Fairness and Imperfect Spectrum Sensing , 2016, IEEE Transactions on Vehicular Technology.
[8] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[9] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[10] Yichao Huang,et al. Random Beamforming with Heterogeneous Users and Selective Feedback: Individual Sum Rate and Individual Scaling Laws , 2013, IEEE Transactions on Wireless Communications.
[11] Vijay K. Bhargava,et al. Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems , 2015, IEEE Transactions on Wireless Communications.
[12] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[13] Victor C. M. Leung,et al. Opportunistic fair resource sharing with secrecy considerations in uplink wiretap channels , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[14] Victor C. M. Leung,et al. Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.
[15] Caijun Zhong,et al. Multi-antenna relay aided wireless physical layer security , 2015, IEEE Communications Magazine.
[16] Victor C. M. Leung,et al. Secrecy analysis of multiuser downlink wiretap networks with opportunistic scheduling , 2015, 2015 IEEE International Conference on Communications (ICC).
[17] Bang Chul Jung,et al. On the Multi-User Diversity with Secrecy in Uplink Wiretap Networks , 2013, IEEE Communications Letters.
[18] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[19] Björn E. Ottersten,et al. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling , 2013, IEEE Signal Processing Letters.
[20] Victor C. M. Leung,et al. CDF-Based Scheduling Algorithm for Proportional Throughput Fairness , 2016, IEEE Communications Letters.
[21] Kin K. Leung,et al. Multi-user diversity for secrecy in wireless networks , 2010, 2010 Information Theory and Applications Workshop (ITA).
[22] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[23] Jianping Pan,et al. Scheduling in a secure wireless network , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[24] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[25] Shi Jin,et al. On Secrecy of a Multi-Antenna System with Eavesdropper in Close Proximity , 2015, IEEE Signal Processing Letters.
[26] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[27] H. Vincent Poor,et al. Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.
[28] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[29] Chau Yuen,et al. Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.
[30] Victor C. M. Leung,et al. Fundamental Limits of CDF-Based Scheduling: Throughput, Fairness, and Feedback Overhead , 2015, IEEE/ACM Transactions on Networking.
[31] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[32] Victor C. M. Leung,et al. Opportunistic Downlink Scheduling With Resource-Based Fairness and Feedback Reduction in Distributed Antenna Systems , 2016, IEEE Transactions on Vehicular Technology.
[33] RIYA,et al. On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels With Opportunistic Scheduling , 2015 .