1 |
Chen X , Makki K , Yen K , et al. Sensor network security:a survey. IEEE Communications Surveys&Tutorials, 2009,11(2): 52-73
|
2 |
Poor H V . Information and inference in the wireless physical layer. IEEE Wireless Communications, 2012,19(1): 40~47
|
3 |
龙航, 袁广翔, 王静 等. 物理层安全技术研究现状与展望. 电信科学, 2011,27(9): 60~65
|
4 |
Wyner A D . The wire-tap channel. Bell System Technical Journal, 1975,54(8): 1355~1387
|
5 |
Leung-Yan-Cheong S K , Hellman M E . The Gaussian wire-tap channel. IEEE Transactions on Information Theory, 1978,IT-24(4): 451~456
|
6 |
Csiszár I , K?rner J . Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 1978,IT-24(3): 339~348
|
7 |
Awan Z H , Zaidi A , Vandendorpe L . Secure communication over parallel relay channel. IEEE Transactions on Information Forensics and Security, 2012,7(2): 359~371
|
8 |
Liu R , Mari I , Spasojevi P , et al. Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions. IEEE Transactions on Information Theory, 2008,54(6): 2493~2507
|
9 |
吉江, 金梁, 黄开枝 . 基于人工噪声的 MISO 保密容量分析. 通信学报, 2012,33(10): 138~142
|
10 |
Gerbracht S , Scheunert C , Jorswieck E A . Secrecy outage in MISO systems with partial channel information. IEEE Transactions on Information Forensics and Security, 2012,7(2): 704~716
|
11 |
Shafiee S , Liu N , Ulukus S . Towards the secrecy capacity of the gaussian MIMO wire-tap channel: the 2-2-1 channel. IEEE Transactions on Information Theory, 2009,55(9): 4033~4039
|
12 |
肖宛阳, 黄开枝, 罗兴国 et al. 基于博弈论的物理层安全建模及现状分析. 信息工程大学学报, 2013,14(4): 402~409
|
13 |
Yuksel M , Liu X , Erkip E . A secure communication game with a relay helping the eavesdropper. IEEE Transactions on Information Forensics and Security, 2011,6(3): 818~830
|
14 |
Mukherjee A , Swindlehurst A L . Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Transactions on Signal Processing, 2013,61(1): 82~91
|
15 |
Han Z , Marina N , Debbah M , et al. Physical layer security game: interaction between source, eavesdropper, and friendly jammer. Eurasip Journal on Wireless Communications and Networking, 2009: 1~10
|
16 |
Saad W , Han Z , Baar T , et al. Distributed coalition formation games for secure wireless transmission. Mobile Networks and Applications, 2011,16(2): 231~245
|
17 |
Fakoorian S A A , Swindlehurst A L . MIMO interference channel with confidential messages: achievable secrecy rates and precoder design. IEEE Transactions on Information Forensics and Security, 2011,6(3): 640~649
|
18 |
Fudenberg D , Levine D K . The Theory of Learning in Games. Cambridge: MIT Press, 1998
|
19 |
Weibull J W . Evolutionary Game Theory. Cambridge: MIT Press, 1995
|