A survey on multiple-antenna techniques for physical layer security
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …
widely recognized as a promising way to enhance wireless security by exploiting the …
Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer
In this paper, we examine the secrecy performance of two-way relaying between a large-
scale multiple antenna base station (BS) and a single antenna mobile user (MU) in the …
scale multiple antenna base station (BS) and a single antenna mobile user (MU) in the …
Expanding the compute-and-forward framework: Unequal powers, signal levels, and multiple linear combinations
The compute-and-forward framework permits each receiver in a Gaussian network to directly
decode a linear combination of the transmitted messages. The resulting linear combinations …
decode a linear combination of the transmitted messages. The resulting linear combinations …
On the geometric ergodicity of Metropolis-Hastings algorithms for lattice Gaussian sampling
Z Wang, C Ling - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
Sampling from the lattice Gaussian distribution has emerged as an important problem in
coding, decoding, and cryptography. In this paper, the classic Metropolis-Hastings (MH) …
coding, decoding, and cryptography. In this paper, the classic Metropolis-Hastings (MH) …
Lattice Gaussian sampling by Markov chain Monte Carlo: Bounded distance decoding and trapdoor sampling
Z Wang, C Ling - IEEE Transactions on Information Theory, 2019 - ieeexplore.ieee.org
Sampling from the lattice Gaussian distribution plays an important role in various research
fields. In this paper, the Markov chain Monte Carlo (MCMC)-based sampling technique is …
fields. In this paper, the Markov chain Monte Carlo (MCMC)-based sampling technique is …
Computation-aided classical-quantum multiple access to boost network communication speeds
A multiple access channel (MAC) consists of multiple senders simultaneously transmitting
their messages to a single receiver. For the classical-quantum case (CQ MAC), achievable …
their messages to a single receiver. For the classical-quantum case (CQ MAC), achievable …
Secrecy rate optimization in wireless multi-hop full duplex networks
F Tian, X Chen, S Liu, X Yuan, D Li, X Zhang… - IEEE …, 2018 - ieeexplore.ieee.org
Physical layer security and full duplex have been two widely applied techniques in wireless
communications community, where the physical layer security can prevent eavesdrop** …
communications community, where the physical layer security can prevent eavesdrop** …
The magic of superposition: A survey on simultaneous transmission based wireless systems
In conventional communication systems, any interference between two communicating
points is regarded as unwanted noise since it distorts the received signals. On the other …
points is regarded as unwanted noise since it distorts the received signals. On the other …
A joint typicality approach to compute–forward
This paper presents a joint typicality framework for encoding and decoding nested linear
codes in multi-user networks. This framework provides a new perspective on compute …
codes in multi-user networks. This framework provides a new perspective on compute …
Lattice-reduction-aided Gibbs algorithm for lattice Gaussian sampling: Convergence enhancement and decoding optimization
Z Wang, Y Huang, S Lyu - IEEE Transactions on Signal …, 2019 - ieeexplore.ieee.org
Sampling from the lattice Gaussian distribution has emerged as an important problem in
coding, decoding, and cryptography. In this paper, lattice reduction technique is adopted to …
coding, decoding, and cryptography. In this paper, lattice reduction technique is adopted to …