Secure transmission over multiple access wiretap channel by cross-time interference injection

H He, S Lyu, B Feng - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Due to the openness of wireless communication, information transmitted in the multiple
access channel is vulnerable to eavesdrop** by illegitimate users. Classic artificial noise …

Secure communication over interference channel: To jam or not to jam?

J Chen - IEEE Transactions on Information Theory, 2019 - ieeexplore.ieee.org
We consider a secure communication over a two-user Gaussian interference channel,
where each transmitter sends a confidential message to its legitimate receiver. For this …

The secrecy capacity of the Gaussian wiretap channel with rate-limited help at the decoder

S Loyka, N Merhav - 2022 IEEE International Symposium on …, 2022 - ieeexplore.ieee.org
The Gaussian wiretap channel with rate-limited help available at the legitimate receiver
(decoder) is studied under various channel configurations (degraded, reversely degraded …

The Secrecy Capacity of the Wiretap Channel With Additive Noise and Rate-Limited Help

S Loyka, N Merhav - IEEE Transactions on Information Theory, 2023 - ieeexplore.ieee.org
The wiretap channel with additive (possibly non-Gaussian) noise and rate-limited help,
available at the legitimate receiver (Rx) or/and transmitter (Tx), is studied under various …

Secure GDoF of the Z-Channel With Finite Precision CSIT: How Robust are Structured Codes?

YC Chan, SA Jafar - IEEE Transactions on Information Theory, 2021 - ieeexplore.ieee.org
Under the assumption of perfect channel state information at the transmitters (CSIT), it is
known that structured codes offer significant advantages for secure communication in an …

Robust optimality of secure TIN

YC Chan, C Geng, SA Jafar - IEEE Transactions on Wireless …, 2021 - ieeexplore.ieee.org
In order to discover larger networks and parameter regimes where sharp Generalized
Degrees of Freedom (GDoF) characterizations may be found based on the optimality of …

Secure MISO broadcast channel: An interplay between CSIT and network topology

ZH Awan, A Sezgin - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
We study the problem of secure transmission over a Gaussian two-user multi-input single-
output (MISO) broadcast channel (BC) under the assumption that links connecting the …

The Secrecy Capacity of Gaussian Wiretap Channels with Rate-Limited Help at the Encoder

S Loyka, N Merhav - 2023 IEEE Information Theory Workshop …, 2023 - ieeexplore.ieee.org
The Gaussian wiretap channel (WTC) with rate-limited help, available at the
transmitter/encoder (Tx), in addition to or instead of the same help at the legitimate receiver …

Multi-layer interference alignment and GDoF of the K-user asymmetric interference channel

J Chen - IEEE Transactions on Information Theory, 2021 - ieeexplore.ieee.org
In wireless networks, link strengths are often affected by some topological factors such as
propagation path loss, shadowing and inter-cell interference. Thus, different users in the …

The Secrecy Capacity of The Gaussian Wiretap Channel with Rate-Limited Help

S Loyka, N Merhav - arxiv preprint arxiv:2209.09356, 2022 - arxiv.org
The Gaussian wiretap channel with rate-limited help, available at the legitimate receiver (Rx)
or/and transmitter (Tx), is studied under various channel configurations (degraded, reversely …