暂无分享,去创建一个
[1] Athina P. Petropulu,et al. Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels , 2009, ArXiv.
[2] Yindi Jing,et al. Network Beamforming Using Relays With Perfect Channel Information , 2007, IEEE Transactions on Information Theory.
[3] Minghua Chen,et al. Amplify-and-forward in wireless relay networks , 2011, 2011 IEEE Information Theory Workshop.
[4] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[5] Brett Schein,et al. Distributed coordination in network information theory , 2001 .
[6] Mustafa Cenk Gursoy,et al. Collaborative Relay Beamforming for Secrecy , 2010, 2010 IEEE International Conference on Communications.
[7] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[8] Zhu Han,et al. Amplify-and-forward based cooperation for secure wireless communications , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Nan Liu,et al. Towards the Secrecy Capacity of the Gaussian MIMO Wire-Tap Channel: The 2-2-1 Channel , 2007, IEEE Transactions on Information Theory.
[11] Joy Kuri,et al. Joint scheduling & jamming for data secrecy in wireless networks , 2013, 2013 11th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt).
[12] Pietro Belotti,et al. Linear Programming Relaxations of Quadratically Constrained Quadratic Programs , 2012, ArXiv.
[13] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[14] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[15] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[16] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[17] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[18] Raviraj S. Adve,et al. Improving amplify-and-forward relay networks: optimal power allocation versus selection , 2006, IEEE Transactions on Wireless Communications.
[19] Lizhong Zheng,et al. Amplify-and-Forward in Wireless Relay Networks: Rate, Diversity, and Network Size , 2007, IEEE Transactions on Information Theory.
[20] R. E. Kalman,et al. Optimum Seeking Methods. , 1964 .
[21] J. R. Bar-on,et al. Global optimization of a quadratic functional with quadratic equality constraints , 1994 .
[22] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[23] Hesham El Gamal,et al. Cooperative Secrecy: The Relay-Eavesdropper Channel , 2007, 2007 IEEE International Symposium on Information Theory.
[24] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.