Author:
Chen Ling,Li Mingchu,Qin Ling,Jie Yingmo
Reference12 articles.
1. Communication theory of secrecy systems;Shannon;Bell System Technical Journal,1998
2. Guaranteeing Secrecy using Artificial Noise;Goel,2008
3. Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback;Zhang;IEEE Transactions on Wireless Communications,2015
4. Information hiding capacity in unknown channel;Yang;Computer Simulation,2006
5. Vincent Conitzer and Tuomas Sandholm. Computing the optimal strategy to commit to. In ACM Conference on Electronic Commerce, pages 82–90, 2006.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献