Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective
暂无分享,去创建一个
[1] Xiaoming Chen,et al. Performance Analysis for Physical Layer Security in Multi-Antenna Downlink Networks with Limited CSI Feedback , 2013, IEEE Wireless Communications Letters.
[2] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[3] Zhi Ding,et al. On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.
[4] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[5] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.
[6] David Tse,et al. Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.
[7] Xin Wang,et al. Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.
[8] Chau Yuen,et al. Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.
[9] Jeffrey G. Andrews,et al. Space Division Multiple Access With a Sum Feedback Rate Constraint , 2007, IEEE Transactions on Signal Processing.
[10] A. Lee Swindlehurst,et al. On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling , 2014, IEEE Communications Letters.
[11] Tao Liu,et al. Energy-efficient power allocation for secure communications in large-scale MIMO relaying systems , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).
[12] Hyundong Shin,et al. Power Allocation and Achievable Secrecy Rates in MISOME Wiretap Channels , 2011, IEEE Communications Letters.
[13] Jeffrey G. Andrews,et al. Opportunistic Space-Division Multiple Access With Beam Selection , 2006, IEEE Trans. Commun..
[14] D. F. Hays,et al. Table of Integrals, Series, and Products , 1966 .
[15] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[16] Aria Nosratinia,et al. Opportunistic Downlink Transmission With Limited Feedback , 2007, IEEE Transactions on Information Theory.
[17] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[18] Björn E. Ottersten,et al. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling , 2013, IEEE Signal Processing Letters.
[19] Shi Jin,et al. Ergodic Secrecy Sum-Rate for Multiuser Downlink Transmission via Regularized Channel Inversion: Large System Analysis , 2014, IEEE Communications Letters.
[20] Sennur Ulukus,et al. The Secrecy Capacity Region of the Gaussian MIMO Multi-Receiver Wiretap Channel , 2009, IEEE Transactions on Information Theory.
[21] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[22] Xiaoming Chen,et al. Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee , 2013, IEEE Communications Letters.
[23] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[24] Hsiao-Hwa Chen,et al. Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI—A Unified Secrecy Performance Analysis , 2014, IEEE Transactions on Signal Processing.
[25] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[26] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[27] Abdul L. Bello,et al. Tables of Integrals, Series, and Products , 1995 .
[28] Chao Wang,et al. Adaptive Mode Selection for Multiuser MIMO Downlink Employing Rateless Codes with QoS Provisioning , 2012, IEEE Transactions on Wireless Communications.
[29] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[30] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[31] Tiejun Lv,et al. Beamforming for secure two-way relay networks with physical layer network coding , 2014, 2014 IEEE Global Communications Conference.
[32] Jeffrey G. Andrews,et al. WLCp1-16: Capacity of Opportunistic Space Division Multiple Access with Beam Selection , 2006, IEEE Globecom 2006.
[33] Tiejun Lv,et al. Robust Beamforming and Jamming for Secure AF Relay Networks with Multiple Eavesdroppers , 2014, 2014 IEEE Military Communications Conference.
[34] Jeffrey G. Andrews,et al. Multi-Mode Transmission for the MIMO Broadcast Channel with Imperfect Channel State Information , 2009, IEEE Transactions on Communications.
[35] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[36] Chau Yuen,et al. Achieving near-capacity at low SNR on a multiple-antenna multiple-user channel , 2009, IEEE Transactions on Communications.
[37] Elza Erkip,et al. On beamforming with finite rate feedback in multiple-antenna systems , 2003, IEEE Trans. Inf. Theory.