Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System
暂无分享,去创建一个
Wei Zhao | Haijun Zhang | Baogang Li | Yuanbin Yao | Yabo Lv | Haijun Zhang | Wei Zhao | Baogang Li | Yuanbin Yao | Yabo Lv
[1] Guangjie Han,et al. A Hierarchical Jammed-Area Mapping Service for Ubiquitous Communication in Smart Communities , 2018, IEEE Communications Magazine.
[2] Qi Zhang,et al. Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels , 2017, IEEE Communications Letters.
[3] Hao Wang,et al. A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things , 2017, Future Gener. Comput. Syst..
[4] Derrick Wing Kwan Ng,et al. Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.
[5] Jie Xu,et al. Proactive eavesdropping via cognitive jamming in fading channels , 2016, 2016 IEEE International Conference on Communications (ICC).
[6] He Chen,et al. Towards secure communication via a wireless-powered full-duplex jammer , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[7] Caijun Zhong,et al. Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.
[8] Inkyu Lee,et al. Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer , 2017, IEEE Transactions on Communications.
[9] Rui Zhang,et al. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.
[10] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.
[11] Hans-Jurgen Zepernick,et al. Proactive attack: A strategy for legitimate eavesdropping , 2016, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).
[12] Jie Xu,et al. Fundamental Rate Limits of Physical Layer Spoofing , 2017, IEEE Wireless Communications Letters.
[13] Jie Xu,et al. Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.
[14] Caijun Zhong,et al. Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.
[15] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.