Search

Showing total 6 results

Search Constraints

Start Over You searched for: Topic interference channels Remove constraint Topic: interference channels Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal ieee transactions on information forensics & security Remove constraint Journal: ieee transactions on information forensics & security
6 results

Search Results

1. Role of Shared Key for Secure Communication Over 2-User Gaussian Z-Interference Channel.

2. Adding a Helper Can Totally Remove the Secrecy Constraints in a Two-User Interference Channel.

3. Both Worst-Case and Chance-Constrained Robust Secure SWIPT in MISO Interference Channels.

4. Two-Multicast Channel With Confidential Messages.

5. Treating Interference as Noise Is Optimal for Covert Communication Over Interference Channels.

6. Secrecy Capacity Region of Fading Binary Z Interference Channel With Statistical CSIT.