Channel-Based Authentication Game in MIMO Systems
暂无分享,去创建一个
[1] Bin Sun,et al. Cooperative Game Approach to Power Allocation for Target Tracking in Distributed MIMO Radar Sensor Networks , 2015, IEEE Sensors Journal.
[2] Xiaohui Liang,et al. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[3] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[4] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[5] Wei-Ho Chung,et al. Distributed channel assignment for network MIMO: game-theoretic formulation and stochastic learning , 2015, Wirel. Networks.
[6] A. Lee Swindlehurst,et al. Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[7] M. J. Gans,et al. On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas , 1998, Wirel. Pers. Commun..
[8] Nicola Laurenti,et al. Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.
[9] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[10] Peter Dayan,et al. Q-learning , 1992, Machine Learning.
[11] Larry J. Greenstein,et al. MIMO-assisted channel-based authentication in wireless networks , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[12] Liang Xiao,et al. Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, GLOBECOM 2014.
[13] Matt Henricksen,et al. Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions" , 2013, IEEE Communications Letters.
[14] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[15] Hong Wen,et al. A framework of the PHY-layer approach to defense against security threats in cognitive radio networks , 2013, IEEE Network.
[16] Hui Li,et al. Toward a unified elastic computing platform for smartphones with cloud support , 2013, IEEE Network.
[17] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).