Secure transmission over multiple access wiretap channel by cross-time interference injection
Due to the openness of wireless communication, information transmitted in the multiple
access channel is vulnerable to eavesdrop** by illegitimate users. Classic artificial noise …
access channel is vulnerable to eavesdrop** by illegitimate users. Classic artificial noise …
Secure communication over interference channel: To jam or not to jam?
J Chen - IEEE Transactions on Information Theory, 2019 - ieeexplore.ieee.org
We consider a secure communication over a two-user Gaussian interference channel,
where each transmitter sends a confidential message to its legitimate receiver. For this …
where each transmitter sends a confidential message to its legitimate receiver. For this …
The secrecy capacity of the Gaussian wiretap channel with rate-limited help at the decoder
The Gaussian wiretap channel with rate-limited help available at the legitimate receiver
(decoder) is studied under various channel configurations (degraded, reversely degraded …
(decoder) is studied under various channel configurations (degraded, reversely degraded …
The Secrecy Capacity of the Wiretap Channel With Additive Noise and Rate-Limited Help
The wiretap channel with additive (possibly non-Gaussian) noise and rate-limited help,
available at the legitimate receiver (Rx) or/and transmitter (Tx), is studied under various …
available at the legitimate receiver (Rx) or/and transmitter (Tx), is studied under various …
Secure GDoF of the Z-Channel With Finite Precision CSIT: How Robust are Structured Codes?
Under the assumption of perfect channel state information at the transmitters (CSIT), it is
known that structured codes offer significant advantages for secure communication in an …
known that structured codes offer significant advantages for secure communication in an …
Robust optimality of secure TIN
In order to discover larger networks and parameter regimes where sharp Generalized
Degrees of Freedom (GDoF) characterizations may be found based on the optimality of …
Degrees of Freedom (GDoF) characterizations may be found based on the optimality of …
Secure MISO broadcast channel: An interplay between CSIT and network topology
ZH Awan, A Sezgin - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
We study the problem of secure transmission over a Gaussian two-user multi-input single-
output (MISO) broadcast channel (BC) under the assumption that links connecting the …
output (MISO) broadcast channel (BC) under the assumption that links connecting the …
The Secrecy Capacity of Gaussian Wiretap Channels with Rate-Limited Help at the Encoder
The Gaussian wiretap channel (WTC) with rate-limited help, available at the
transmitter/encoder (Tx), in addition to or instead of the same help at the legitimate receiver …
transmitter/encoder (Tx), in addition to or instead of the same help at the legitimate receiver …
Multi-layer interference alignment and GDoF of the K-user asymmetric interference channel
J Chen - IEEE Transactions on Information Theory, 2021 - ieeexplore.ieee.org
In wireless networks, link strengths are often affected by some topological factors such as
propagation path loss, shadowing and inter-cell interference. Thus, different users in the …
propagation path loss, shadowing and inter-cell interference. Thus, different users in the …
The Secrecy Capacity of The Gaussian Wiretap Channel with Rate-Limited Help
The Gaussian wiretap channel with rate-limited help, available at the legitimate receiver (Rx)
or/and transmitter (Tx), is studied under various channel configurations (degraded, reversely …
or/and transmitter (Tx), is studied under various channel configurations (degraded, reversely …