A survey on multiple-antenna techniques for physical layer security

X Chen, DWK Ng, WH Gerstacker… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As a complement to high-layer encryption techniques, physical layer security has been
widely recognized as a promising way to enhance wireless security by exploiting the …

Optimal power allocation and secrecy sum rate in two-way untrusted relaying networks with an external jammer

A Kuhestani, A Mohammadi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we examine the secrecy performance of two-way relaying between a large-
scale multiple antenna base station (BS) and a single antenna mobile user (MU) in the …

Expanding the compute-and-forward framework: Unequal powers, signal levels, and multiple linear combinations

B Nazer, VR Cadambe, V Ntranos… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The compute-and-forward framework permits each receiver in a Gaussian network to directly
decode a linear combination of the transmitted messages. The resulting linear combinations …

On the geometric ergodicity of Metropolis-Hastings algorithms for lattice Gaussian sampling

Z Wang, C Ling - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
Sampling from the lattice Gaussian distribution has emerged as an important problem in
coding, decoding, and cryptography. In this paper, the classic Metropolis-Hastings (MH) …

Lattice Gaussian sampling by Markov chain Monte Carlo: Bounded distance decoding and trapdoor sampling

Z Wang, C Ling - IEEE Transactions on Information Theory, 2019 - ieeexplore.ieee.org
Sampling from the lattice Gaussian distribution plays an important role in various research
fields. In this paper, the Markov chain Monte Carlo (MCMC)-based sampling technique is …

Computation-aided classical-quantum multiple access to boost network communication speeds

M Hayashi, Á Vázquez-Castro - Physical Review Applied, 2021 - APS
A multiple access channel (MAC) consists of multiple senders simultaneously transmitting
their messages to a single receiver. For the classical-quantum case (CQ MAC), achievable …

Secrecy rate optimization in wireless multi-hop full duplex networks

F Tian, X Chen, S Liu, X Yuan, D Li, X Zhang… - IEEE …, 2018 - ieeexplore.ieee.org
Physical layer security and full duplex have been two widely applied techniques in wireless
communications community, where the physical layer security can prevent eavesdrop** …

The magic of superposition: A survey on simultaneous transmission based wireless systems

U Altun, GK Kurt, E Ozdemir - IEEE Access, 2022 - ieeexplore.ieee.org
In conventional communication systems, any interference between two communicating
points is regarded as unwanted noise since it distorts the received signals. On the other …

A joint typicality approach to compute–forward

SH Lim, C Feng, A Pastore, B Nazer… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper presents a joint typicality framework for encoding and decoding nested linear
codes in multi-user networks. This framework provides a new perspective on compute …

Lattice-reduction-aided Gibbs algorithm for lattice Gaussian sampling: Convergence enhancement and decoding optimization

Z Wang, Y Huang, S Lyu - IEEE Transactions on Signal …, 2019 - ieeexplore.ieee.org
Sampling from the lattice Gaussian distribution has emerged as an important problem in
coding, decoding, and cryptography. In this paper, lattice reduction technique is adopted to …