Author of the publication

To avoid or not to avoid CSI leakage in physical layer secret communication systems.

, , , , and . IEEE Communications Magazine, 53 (12): 19-25 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peak to Average Power Ratio Reduction for Multicarrier Systems Using Dirty Paper Coding., , , and . JCM, 2 (3): 9-16 (2007)On secure beamforming for wiretap channels with partial channel state information at the transmitter., , , and . APSIPA, page 1-5. IEEE, (2012)Secure transmission over fast fading multiple-antenna Gaussian broadcast channel with confidential messages., , and . GLOBECOM Workshops, page 1292-1296. IEEE, (2013)Cognitive radio with unidirectional transmitter and receiver cooperations., , , and . CISS, page 1-5. IEEE, (2010)Peak To Average Power Ratio Reduction for Multicarrier Systems Using Dirty Paper Coding., , , and . ICASSP (4), page 297-300. IEEE, (2006)On the Fast Fading Gaussian Wiretap Channel With Statistical Channel State Information at the Transmitter., and . IEEE Trans. Information Forensics and Security, 11 (1): 46-58 (2016)Joint Subcarrier Pairing and Power Allocation for OFDM Transmission With Decode-and-Forward Relaying., , and . IEEE Trans. Signal Processing, 59 (1): 399-414 (2011)Jamming-resistant frequency hopping system with secret key generation from channel observations., , , and . ITW, page 46-50. IEEE, (2016)Delay-Aware Resource Allocation for 5G Wireless Networks With Wireless Power Transfer., , , , and . IEEE Trans. Vehicular Technology, 67 (7): 5841-5855 (2018)Stealthy Secret Key Generation., , and . CoRR, (2017)