1 |
S. Goel, R. Negi, “Guaranteeing Secrecy Using Artificial Noise,” IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, June. 2008. Article (CrossRef Link).
DOI
|
2 |
X. Chen and R. Yin, “Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback,” IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503–506, October. 2013. Article (CrossRef Link).
DOI
|
3 |
Y. Liu, L. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, “Relay selection for security enhancement in cognitive relay networks,” IEEE Commun. Lett., vol. 4, no. 1, pp. 46–49, February. 2015. Article (CrossRef Link).
DOI
|
4 |
A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no.8, pp. 1355-1387, August. 1975. Article (CrossRef Link).
DOI
|
5 |
A. Mukherjee and A. L. Swindlehurst, "Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels," in Proc. of 2009 Allerton Conf. Commun., Control, Comput., pp. 1134-1141. September. 30-October. 2, 2009. Article (CrossRef Link).
|
6 |
N. Li, X. Tao, and J. Xu, “Artificial Noise Assisted Communication in the Multiuser Downlink: Optimal Power Allocation,” IEEE Commun. Lett., vol. 19, no. 2, pp. 295–298, February. 2015. Article (CrossRef Link).
DOI
|
7 |
M. Pei, J. Wei, K. Wong, and X. Wang, “Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI,” IEEE Trans. Wireless Commun., vol. 11, no.2, pp. 544-549, February. 2012. Article (CrossRef Link).
DOI
|
8 |
T. Shang-Ho, H. Vincent, “Power Allocation for Artificial-Noise Secure MIMO Precoding Systems,” IEEE Transactions on. Signal Processing, vol. 62, no.13, pp. 3479-3492, July. 2014. Article (CrossRef Link).
DOI
|
9 |
N. Li, X. Tao, H. Wu, J. Xu and Q. Cui "Large System Analysis of Artificial Noise Assisted Communication in the Multiuser Downlink: Ergodic Secrecy Sum-rate and Optimal Power Allocation," IEEE Vehicular Technology Society, to appear. Article (CrossRef Link).
|
10 |
Q. Li, W. Ma, and S. Anthony, “A Safe Approximation Approach to Secrecy Outage Design for MIMO Wiretap Channels,” IEEE Signal Processing Letters, vol. 21, no.1, pp. 118–121, January. 2014. Article (CrossRef Link).
DOI
|
11 |
F. Wu, W. Wang, B. Yao and Q.Y. Yin, "Effective eavesdropping in the Artificial noise aided security scheme," in Proc. of 2013 IEEE/CIC International Conference on Communications in China (ICCC), pp. 214 - 218, August.12-14, 2013. Article (CrossRef Link).
|
12 |
L. Lu, L. Jin, and K. Huang, "Eavesdropping Against Artificial Noise: Hyperplane Clustering," in Proc. of IEEE International Conference on Information Science and Technology, pp. 1571-1575, March. 23-25, 2013. Article (CrossRef Link).
|
13 |
D. T. Pham and J. Cardoso., “Blind separation of instantaneous mixtures of nonstationary sources,” IEEE Trans. Signal Process., vol. 49, no.9, pp.1837-1848, September. 2001. Article (CrossRef Link).
DOI
|
14 |
S. Liu, Y. Hong, and E. Viterbo, "Artificial Noise Revisited: When Eve Has more Antennas than Alice," in Proc. of IEEE Int. Conf. Signal Process. Commun. (SPCOM), pp. 1-5, July.22-25, 2014. Article (CrossRef Link).
|
15 |
J. Rissanen, F. R. Hill; R. L. Pickholtz "Estimating the number of signals using the eigenvalues of the correlation matrix," in Proc. of Military Communications Conference 1989 (MILCOM '89). Conference Record. Bridging the Gap. Interoperability, Survivability, Security, pp. 353-358, October 15-18, 1989. Article (CrossRef Link).
|
16 |
Q. H. Spencer, A. L. Swindlehurst, and M. Haardt., “Zero forcing methods for downlink spatial multiplexing in multiuser MIMO channels,” IEEE Trans. Signal Process., vol. 52, no.2,.pp.461-471, February. 2004. Article (CrossRef Link).
DOI
|
17 |
F. Gu, Z. Hang, and Y. Xiao, "Multichannel blind deconvolution of complex I/Q independent sources with phase recovery," in Proc. of International Conference on Wireless Communications and Signal Processing (WCSP), pp.1-6, October 24-26,2013. Article (CrossRef Link).
|