暂无分享,去创建一个
Marius Pesavento | George C. Alexandropoulos | Liang Li | Ying Liu | G. Alexandropoulos | M. Pesavento | Y. Liu | Liang Li
[1] Luca Sanguinetti,et al. A Tutorial on the Optimization of Amplify-and-Forward MIMO Relay Systems , 2012, IEEE Journal on Selected Areas in Communications.
[2] Yasutada Oohama,et al. Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.
[3] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[4] Abbas El Gamal,et al. Capacity theorems for the relay channel , 1979, IEEE Trans. Inf. Theory.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Byung-Jae Kwak,et al. LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.
[7] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[8] A. Lee Swindlehurst,et al. Securing multi-antenna two-way relay channels with analog network coding against eavesdroppers , 2010, 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[9] M. L. Meade,et al. Signals and Systems: Models and Behaviour , 1986 .
[10] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[11] Dongtang Ma,et al. Adaptive Limited Feedback for MISO Wiretap Channels With Cooperative Jamming , 2013, IEEE Transactions on Signal Processing.
[12] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[13] Gregory W. Wornell,et al. Cooperative diversity in wireless networks: Efficient protocols and outage behavior , 2004, IEEE Transactions on Information Theory.
[14] Meixia Tao,et al. Secure beamforming for MIMO two-way transmission with an untrusted relay , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[15] Mandy Eberhart,et al. Digital Communication Over Fading Channels , 2016 .
[16] Adeel Razi,et al. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.
[17] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[18] Feifei Gao,et al. Optimal Training Design for Channel Estimation in Amplify and Forward Relay Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[19] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[20] Marius Pesavento,et al. Downlink Opportunistic Scheduling with Low-Rate Channel State Feedback: Error Rate Analysis and Optimization of the Feedback Parameters , 2010, IEEE Transactions on Communications.
[21] Stefania Sesia,et al. LTE - The UMTS Long Term Evolution, Second Edition , 2011 .
[22] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[23] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[24] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[25] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[26] D. F. Hays,et al. Table of Integrals, Series, and Products , 1966 .
[27] Derrick Wing Kwan Ng,et al. Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.
[28] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[29] A. Lee Swindlehurst,et al. Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[30] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[31] Marius Pesavento,et al. Enhancing physical layer security in untrusted relay networks with artificial noise: A symbol error rate based approach , 2014, 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM).
[32] Ramjee Prasad,et al. Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art , 2012, J. Cyber Secur. Mobil..
[33] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[34] Matthew R. McKay,et al. Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.
[35] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[36] John A. Nelder,et al. A Simplex Method for Function Minimization , 1965, Comput. J..
[37] Shlomo Shamai,et al. New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages , 2011, IEEE Transactions on Information Theory.
[38] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[39] Helmut Bölcskei,et al. Crystallization in Large Wireless Networks , 2007, IEEE Transactions on Information Theory.
[40] Mohamed-Slim Alouini,et al. Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .
[41] Yasutada Oohama,et al. Coding for relay channels with confidential messages , 2001, Proceedings 2001 IEEE Information Theory Workshop (Cat. No.01EX494).
[42] J. Boutros,et al. On communication over fading channels , 1996, Proceedings of ICUPC - 5th International Conference on Universal Personal Communications.
[43] Mukesh Singhal,et al. Design of an architecture for multiple security levels in wireless sensor networks , 2010, 2010 Seventh International Conference on Networked Sensing Systems (INSS).
[44] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[45] Soung Chang Liew,et al. Physical-layer network coding: Tutorial, survey, and beyond , 2011, Phys. Commun..
[46] Amitav Mukherjee,et al. Imbalanced Beamforming by a Multi-Antenna Source for Secure Utilization of an Untrusted Relay , 2013, IEEE Communications Letters.
[47] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[48] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[49] Ananthanarayanan Chockalingam,et al. Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI , 2013, 2013 IEEE International Conference on Communications (ICC).
[50] Erik Dahlman,et al. 4G: LTE/LTE-Advanced for Mobile Broadband , 2011 .
[51] A. Lee Swindlehurst,et al. Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.
[52] Raymond Knopp,et al. A practical method for wireless channel reciprocity exploitation through relative calibration , 2005, Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005..
[53] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[54] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[55] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[56] Bharat K. Bhargava,et al. A role-based access in a hierarchical sensor network architecture to provide multilevel security , 2008, Comput. Commun..
[57] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.