Transmit Optimization for Symbol-Level Spoofing
暂无分享,去创建一个
[1] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[2] Christos Masouros,et al. Exploiting Known Interference as Green Signal Power for Downlink Beamforming Optimization , 2015, IEEE Transactions on Signal Processing.
[3] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.
[4] Jie Xu,et al. Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.
[5] Rui Zhang,et al. Active eavesdropping via spoofing relay attack , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Jie Xu,et al. Wireless Surveillance of Two-Hop Communications , 2017, ArXiv.
[7] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[8] Dan Rubenstein,et al. Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[9] Eduard Axel Jorswieck,et al. Optimal transmitter and jamming strategies in Gaussian MIMO channels , 2005, 2005 IEEE 61st Vehicular Technology Conference.
[10] Christos Masouros,et al. Dynamic linear precoding for the exploitation of known interference in MIMO broadcast systems , 2009, IEEE Transactions on Wireless Communications.
[11] Jie Xu,et al. Transmit Optimization for Symbol-Level Spoofing with BPSK Signaling , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[12] Sennur Ulukus,et al. Mutual Information Games in Multi-user Channels with Correlated Jamming , 2006, ArXiv.
[13] Symeon Chatzinotas,et al. Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel , 2014, IEEE Transactions on Signal Processing.
[14] Miguel R. D. Rodrigues,et al. On multiple-input multiple-output Gaussian channels with arbitrary inputs subject to jamming , 2009, 2009 IEEE International Symposium on Information Theory.
[15] Ming Li,et al. Disrupting MIMO Communications With Optimal Jamming Signal Design , 2015, IEEE Transactions on Wireless Communications.
[16] Dijiang Huang,et al. Using Power Hopping to Counter MAC Spoof Attacks in WLAN , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[17] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[18] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[19] R. Srikant,et al. Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[20] Rui Zhang,et al. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.
[21] Jie Xu,et al. Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.
[22] Symeon Chatzinotas,et al. Directional Modulation Via Symbol-Level Precoding: A Way to Enhance Security , 2016, IEEE Journal of Selected Topics in Signal Processing.
[23] J.M. Cioffi,et al. Spatially-Correlated Jamming in Gaussian Multiple Access and Broadcast Channels , 2006, 2006 40th Annual Conference on Information Sciences and Systems.