On the Role of Artificial Noise in Training and Data Transmission for Secret Communications
暂无分享,去创建一个
[1] Xiangyun Zhou,et al. Two-Way Training for Discriminatory Channel Estimation in Wireless MIMO Systems , 2011, IEEE Transactions on Signal Processing.
[2] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[3] Babak Hassibi,et al. Analysis of multiple-antenna wireless links at low SNR , 2004, IEEE Transactions on Information Theory.
[4] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[5] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[6] Yao-Win Peter Hong,et al. How much training is enough for secrecy beamforming with artificial noise , 2012, 2012 IEEE International Conference on Communications (ICC).
[7] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[8] Chong-Yung Chi,et al. Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems , 2010, IEEE Transactions on Signal Processing.
[9] Mohamed-Slim Alouini,et al. On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.
[10] Giuseppe Caire,et al. Multiuser MIMO Achievable Rates With Downlink Training and Channel State Feedback , 2007, IEEE Transactions on Information Theory.
[11] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[12] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[13] Tung-Sang Ng,et al. Joint CFO and Channel Estimation for Multiuser MIMO-OFDM Systems With Optimal Training Sequences , 2008, IEEE Transactions on Signal Processing.
[14] Daniel Pérez Palomar,et al. Power Control By Geometric Programming , 2007, IEEE Transactions on Wireless Communications.
[15] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[16] Andrea J. Goldsmith,et al. Capacity and power allocation for fading MIMO channels with channel estimation error , 2006, IEEE Trans. Inf. Theory.
[17] Tan F. Wong,et al. Training sequence optimization in MIMO systems with colored interference , 2004, IEEE Transactions on Communications.
[18] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[19] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[20] H. Vincent Poor,et al. Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.
[21] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[22] Aylin Yener,et al. MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States , 2014, IEEE Transactions on Information Theory.
[23] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[24] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[25] Chong-Yung Chi,et al. On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.
[26] Mung Chiang,et al. Geometric Programming for Communication Systems , 2005, Found. Trends Commun. Inf. Theory.
[27] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[28] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[29] Sergio Verdú,et al. Second-order asymptotics of mutual information , 2004, IEEE Transactions on Information Theory.
[30] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[31] Babak Hassibi,et al. How much training is needed in multiple-antenna wireless links? , 2003, IEEE Trans. Inf. Theory.
[32] Alex B. Gershman,et al. Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals , 2006, IEEE Transactions on Signal Processing.
[33] Derrick Wing Kwan Ng,et al. Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.
[34] Eduard A. Jorswieck,et al. To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.
[35] Chong-Yung Chi,et al. Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.