Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs
暂无分享,去创建一个
Chong-Yung Chi | Jing Wang | Yin Sun | Xiang Chen | Tsung-Hui Chang | Haohao Qin | Ming Zhao | Tsung-Hui Chang | Jing Wang | Chong-Yung Chi | Yin Sun | Xiang Chen | Ming Zhao | Haohao Qin
[1] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[2] H. Vincent Poor,et al. Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels , 2012, IEEE Transactions on Information Forensics and Security.
[3] Cong Shen,et al. The Wireless Communications Physical Layer , 2006 .
[4] Miguel R. D. Rodrigues,et al. MIMO Gaussian Channels With Arbitrary Inputs: Optimal Precoding and Power Allocation , 2010, IEEE Transactions on Information Theory.
[5] G. Giannakis,et al. Wireless Multicarrier Communications where Fourier Meets , 2022 .
[6] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[7] Qiang Li,et al. Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[8] Zhi-Quan Luo,et al. Duality Gap Estimation and Polynomial Time Approximation for Optimal Spectrum Management , 2009, IEEE Transactions on Signal Processing.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Philip M. Morse,et al. Methods of Mathematical Physics , 1947, The Mathematical Gazette.
[11] Jos F. Sturm,et al. A Matlab toolbox for optimization over symmetric cones , 1999 .
[12] Stephen G. Wilson,et al. Digital Modulation and Coding , 1995 .
[13] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[14] Aylin Yener,et al. MIMO multiple access channel with an arbitrarily varying eavesdropper , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[15] Shlomo Shamai,et al. Estimation in Gaussian Noise: Properties of the Minimum Mean-Square Error , 2010, IEEE Transactions on Information Theory.
[16] J. L. Massey,et al. An introduction to contemporary cryptology , 1988, Proc. IEEE.
[17] Chong-Yung Chi,et al. Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems , 2010, IEEE Transactions on Signal Processing.
[18] H. Vincent Poor,et al. A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.
[19] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[20] Gordon P. Wright,et al. Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..
[21] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[22] A. Lee Swindlehurst,et al. Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.
[23] Houman Zarrinkoub. Modulation and Coding , 2014 .
[24] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[25] Roy D. Yates,et al. Secrecy capacity of independent parallel channels , 2009 .
[26] Daniel Pérez Palomar,et al. Gradient of mutual information in linear vector Gaussian channels , 2006, IEEE Transactions on Information Theory.
[27] Zhi Ding,et al. On Secrecy Rate Analysis of MIMO Wiretap Channels Driven by Finite-Alphabet Input , 2011, IEEE Transactions on Communications.
[28] Anelia Somekh-Baruch,et al. On Gaussian wiretap channels with M-PAM inputs , 2010, 2010 European Wireless Conference (EW).
[29] Roy D. Yates,et al. Secret Communication via Multi-antenna Transmission , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[30] Zhi Ding,et al. Linear Precoding for Finite-Alphabet Signaling Over MIMOME Wiretap Channels , 2012, IEEE Transactions on Vehicular Technology.
[31] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[32] Qiang Li,et al. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.
[33] Zhi Ding,et al. On the Secrecy Rate of Multi-Antenna Wiretap Channel under Finite-Alphabet Input , 2011, IEEE Communications Letters.
[34] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[35] Wade Trappe,et al. Achieving Secret Communication for Fast Rayleigh Fading Channels , 2010, IEEE Transactions on Wireless Communications.
[36] Shlomo Shamai,et al. Mutual information and minimum mean-square error in Gaussian channels , 2004, IEEE Transactions on Information Theory.
[37] Andrey Garnaev,et al. An Eavesdropping Game with SINR as an Objective Function , 2009, SecureComm.
[38] A. Papoulis. Signal Analysis , 1977 .
[39] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[40] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[41] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[42] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[43] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[44] Eduard A. Jorswieck,et al. Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.
[45] Antonia Maria Tulino,et al. Optimum power allocation for parallel Gaussian channels with arbitrary input distributions , 2006, IEEE Transactions on Information Theory.
[46] H. Vincent Poor,et al. The Wiretap Channel With Feedback: Encryption Over the Channel , 2007, IEEE Transactions on Information Theory.
[47] Randall K. Nichols,et al. Wireless Security: Models, Threats, and Solutions , 2001 .
[48] Daniel Pérez Palomar,et al. Gradient of mutual information in linear vector Gaussian channels , 2005, ISIT.
[49] Georgios B. Giannakis,et al. Wireless multicarrier communications , 2000, IEEE Signal Process. Mag..
[50] B. Sundar Rajan,et al. Secrecy Capacity of the Gaussian Wire-Tap Channel with Finite Complex Constellation Input , 2010, ArXiv.
[51] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[52] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .