This paper considers a wireless interference network in which the communication between multiple transmitter-user pairs is overheard by multiple eavesdroppers (EVs). Based on knowledge of the channel distribution, the goal is to maximize the worst users' secrecy rate under both long (infinite) blocklength and short (finite) blocklength transmissions. Under long blocklength transmission, the performance of the existing algorithms is unsatisfactory when the wiretapped channels are sufficiently strong. To address this drawback, we adopt a time-fraction based information and artificial noise (AN) transmission, under which first the information is transmitted within the initial fraction of the time slot and then AN is transmitted within the rema...
We discuss the architecture of wireless multiple-input multiple-output (MIMO) channels with additive...
For physical layer security with multiple antennas over wireless channels, we consider an artificial...
For physical layer security with multiple antennas over wireless channels, we consider an artificial...
Under both long (infinite) and short (finite) blocklength transmissions, this paper considers physic...
© 2017 IEEE. Considering a multi-user interference network with an eavesdropper, this paper investig...
© 2017 IEEE. Considering a multi-user interference network with an eavesdropper, this paper investig...
Considering a multi-user interference network with an eavesdropper, this paper investigates the prob...
© 2002-2012 IEEE. Considering a multi-user interference network with an eavesdropper, this paper aim...
In this paper, we give a unified performance optimization for secrecy wireless information and power...
In this paper, we give a unified performance optimization for secrecy wireless information and power...
Since a wireless transmission requires to access to a shared medium, the communication is susceptibl...
Treating interference as noise (TIN) when it is sufficiently weak is one of the key principles of in...
Abstract—Interference in wireless networks degrades the sig-nal quality at the terminals. However, i...
We consider the problem of secure communication in wireless fading channels in the presence of non-c...
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy...
We discuss the architecture of wireless multiple-input multiple-output (MIMO) channels with additive...
For physical layer security with multiple antennas over wireless channels, we consider an artificial...
For physical layer security with multiple antennas over wireless channels, we consider an artificial...
Under both long (infinite) and short (finite) blocklength transmissions, this paper considers physic...
© 2017 IEEE. Considering a multi-user interference network with an eavesdropper, this paper investig...
© 2017 IEEE. Considering a multi-user interference network with an eavesdropper, this paper investig...
Considering a multi-user interference network with an eavesdropper, this paper investigates the prob...
© 2002-2012 IEEE. Considering a multi-user interference network with an eavesdropper, this paper aim...
In this paper, we give a unified performance optimization for secrecy wireless information and power...
In this paper, we give a unified performance optimization for secrecy wireless information and power...
Since a wireless transmission requires to access to a shared medium, the communication is susceptibl...
Treating interference as noise (TIN) when it is sufficiently weak is one of the key principles of in...
Abstract—Interference in wireless networks degrades the sig-nal quality at the terminals. However, i...
We consider the problem of secure communication in wireless fading channels in the presence of non-c...
We consider the symmetric Gaussian interference channel where two users try to enhance their secrecy...
We discuss the architecture of wireless multiple-input multiple-output (MIMO) channels with additive...
For physical layer security with multiple antennas over wireless channels, we consider an artificial...
For physical layer security with multiple antennas over wireless channels, we consider an artificial...