In this paper, we investigate transmit beampattern optimization techniques for a multiple-input multiple-output radar in the presence of a legitimate communications receiver and an eavesdropping target. The primary objectives of the radar are to satisfy a certain target-detection criterion and to simultaneously communicate safely with a legitimate receiver by maximizing the secrecy rate against the eavesdropping target. Therefore, we consider three optimization problems, namely target return signal-to-interference-plus-noise ratio maximization, secrecy rate maximization, and transmit power minimization. However, these problems are nonconvex due to the nonconcavity of the secrecy rate function, which appears in all three optimizations either...
peer reviewedTo achieve perfect secrecy in a multiple-input multiple-output (MIMO) Gaussian wiretap ...
In this paper, we consider decode-and-forward (DF) relay beamforming for secrecy with cooperative ja...
Abstract — This paper studies the secure communication be-tween a multiple-antenna transmitter (Alic...
In this paper, we investigate transmit beampattern optimization techniques for a multiple-input mult...
In this paper, we investigate transmit beampattern optimization techniques for a multiple-input mult...
We consider physical layer security in a multi-input multi-output multi-eavesdropper wiretap channel...
In this paper, we study different secrecy rate optimization techniques for a multiple-input-multiple...
This letter investigates robust secrecy rate optimization techniques for a multiple-input-multiple-o...
This paper investigates the impact of intelligent reflecting surface (IRS) enabled wireless secure t...
This paper considers transmit beamforming in dual-function radar-communication (DFRC) system, where ...
Abstract—Optimal signaling for secrecy rate maximization in Gaussian MIMO wiretap channels is consid...
We discuss the architecture of wireless multiple-input multiple-output (MIMO) channels with additive...
Abstract—In this paper, we investigate methods for reducing the likelihood that a message transmitte...
Abstract We consider a secure transmission including a transmitter, a receiver and an eavesdropper,...
peer reviewedThis paper presents novel numerical approaches to finding the secrecy capacity of the m...
peer reviewedTo achieve perfect secrecy in a multiple-input multiple-output (MIMO) Gaussian wiretap ...
In this paper, we consider decode-and-forward (DF) relay beamforming for secrecy with cooperative ja...
Abstract — This paper studies the secure communication be-tween a multiple-antenna transmitter (Alic...
In this paper, we investigate transmit beampattern optimization techniques for a multiple-input mult...
In this paper, we investigate transmit beampattern optimization techniques for a multiple-input mult...
We consider physical layer security in a multi-input multi-output multi-eavesdropper wiretap channel...
In this paper, we study different secrecy rate optimization techniques for a multiple-input-multiple...
This letter investigates robust secrecy rate optimization techniques for a multiple-input-multiple-o...
This paper investigates the impact of intelligent reflecting surface (IRS) enabled wireless secure t...
This paper considers transmit beamforming in dual-function radar-communication (DFRC) system, where ...
Abstract—Optimal signaling for secrecy rate maximization in Gaussian MIMO wiretap channels is consid...
We discuss the architecture of wireless multiple-input multiple-output (MIMO) channels with additive...
Abstract—In this paper, we investigate methods for reducing the likelihood that a message transmitte...
Abstract We consider a secure transmission including a transmitter, a receiver and an eavesdropper,...
peer reviewedThis paper presents novel numerical approaches to finding the secrecy capacity of the m...
peer reviewedTo achieve perfect secrecy in a multiple-input multiple-output (MIMO) Gaussian wiretap ...
In this paper, we consider decode-and-forward (DF) relay beamforming for secrecy with cooperative ja...
Abstract — This paper studies the secure communication be-tween a multiple-antenna transmitter (Alic...