Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink
暂无分享,去创建一个
Kostas Berberidis | Ioannis Krikidis | Sotirios Karachontzitis | Stelios Timotheou | S. Timotheou | K. Berberidis | I. Krikidis | Sotirios Karachontzitis
[1] Roy D. Yates,et al. Secrecy capacity of independent parallel channels , 2009 .
[2] John W. Fowler,et al. Heuristics for minimizing regular performance measures in unrelated parallel machine scheduling problems , 2011, Comput. Oper. Res..
[3] George L. Nemhauser,et al. Models for representing piecewise linear cost functions , 2004, Oper. Res. Lett..
[4] John M. Cioffi,et al. Increase in capacity of multiuser OFDM system using dynamic subchannel allocation , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).
[5] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[6] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.
[7] Chong-Yung Chi,et al. Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.
[8] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[9] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[10] Yueming Cai,et al. Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks , 2013, EURASIP Journal on Wireless Communications and Networking.
[11] Derrick Wing Kwan Ng,et al. Resource Allocation for Secure OFDMA Networks with Imperfect CSIT , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[12] Dimitri P. Bertsekas,et al. Nonlinear Programming , 1997 .
[13] Jing Wang,et al. Joint power allocation and artificial noise design for multiuser wiretap OFDM channels , 2013, 2013 IEEE International Conference on Communications (ICC).
[14] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[15] Mauro Dell'Amico,et al. Assignment Problems , 1998, IFIP Congress: Fundamentals - Foundations of Computer Science.
[16] Miguel R. D. Rodrigues,et al. Power allocation strategies for OFDM Gaussian wiretap channels with a friendly jammer , 2013, 2013 IEEE International Conference on Communications (ICC).
[17] Robert W. Heath,et al. Antenna Subset Modulation for secure millimeter-wave wireless communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[18] Jeffrey G. Andrews,et al. Fundamentals of Lte , 2010 .
[19] Josef A. Nossek,et al. Rate Balancing in Multiuser MIMO OFDM Systems , 2009, IEEE Transactions on Communications.
[20] Derrick Wing Kwan Ng,et al. Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.
[21] Frédérique E. Oggier,et al. An Error Probability Approach to MIMO Wiretap Channels , 2011, IEEE Transactions on Communications.
[22] Matthieu R. Bloch,et al. Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.
[23] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[24] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[25] Xin-Ping Guan,et al. Cross-layer scheduling with secrecy demands in delay-aware OFDMA network , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[26] Bayan S. Sharif,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.
[27] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[28] Eduard A. Jorswieck,et al. Resource allocation for the wire-tap multi-carrier broadcast channel , 2008, 2008 International Conference on Telecommunications.
[29] Zhu Han,et al. Physical layer security in wireless networks with passive and active eavesdroppers , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[30] Stelios Timotheou,et al. Asset-Task Assignment Algorithms in the Presence of Execution Uncertainty , 2011, Comput. J..
[31] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[32] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[33] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[34] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[35] S. Shamai,et al. Secrecy Capacity Region of Parallel Broadcast Channels , 2007, 2007 Information Theory and Applications Workshop.
[36] Derrick Wing Kwan Ng,et al. Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.
[37] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[38] Athina P. Petropulu,et al. Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.
[39] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[40] Nihar Jindal,et al. Are yesterday-s information-theoretic fading models and performance metrics adequate for the analysis of today's wireless systems? , 2012, IEEE Communications Magazine.
[41] Nicola Laurenti,et al. Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes , 2014, IEEE Transactions on Information Forensics and Security.
[42] Narendra Karmarkar,et al. A new polynomial-time algorithm for linear programming , 1984, STOC '84.
[43] Holger Boche,et al. Accepted for Publication in Ieee Transactions on Signal Processing 1 Robust Qos-constrained Optimization of Downlink Multiuser Miso Systems , 2022 .
[44] Zhu Han,et al. Weighted Max-Min Resource Allocation for Frequency Selective Channels , 2010, IEEE Transactions on Signal Processing.
[45] Walid Saad,et al. On the Physical Layer Security of Backscatter Wireless Systems , 2014, IEEE Transactions on Wireless Communications.
[46] Wei Yu,et al. Dual methods for nonconvex spectrum optimization of multicarrier systems , 2006, IEEE Transactions on Communications.
[47] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security - Part I: Theoretical Aspects , 2006, ArXiv.