Cooperation with an untrusted relay: A secrecy perspective X He, A Yener IEEE Transactions on Information Theory 56 (8), 3807-3827, 2010 | 410 | 2010 |
Cooperative security at the physical layer: A summary of recent advances R Bassily, E Ekrem, X He, E Tekin, J Xie, MR Bloch, S Ulukus, A Yener IEEE Signal Processing Magazine 30 (5), 16-28, 2013 | 235 | 2013 |
Two-hop secure communication using an untrusted relay: A case for cooperative jamming X He, A Yener IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008 | 180 | 2008 |
Two-hop secure communication using an untrusted relay X He, A Yener EURASIP Journal on Wireless Communications and Networking 2009, 9, 2009 | 102 | 2009 |
Providing secrecy with structured codes: Two-user Gaussian channels X He, A Yener IEEE Transactions on Information Theory 60 (4), 2121-2138, 2014 | 94 | 2014 |
The role of feedback in two-way secure communication X He, A Yener the 42nd Annual Asilomar Conference on Signals, Systems, and Computers …, 2008 | 85* | 2008 |
Providing secrecy with structured codes: Tools and applications to two-user Gaussian channels X He, A Yener submitted to IEEE Transactions on Information Theory, 2009 | 79 | 2009 |
Strong secrecy and reliable byzantine detection in the presence of an untrusted relay X He, A Yener submitted to IEEE Transactions on Information Theory, Arxiv preprint arXiv …, 2010 | 73 | 2010 |
MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom X He, A Khisti, A Yener IEEE Transactions on Information Theory 59 (8), 4733-4745, 2013 | 61 | 2013 |
End-to-end secure multi-hop communication with untrusted relays X He, A Yener IEEE transactions on wireless communications 12 (1), 1-11, 2012 | 59 | 2012 |
MIMO wiretap channels with unknown and varying eavesdropper channel states X He, A Yener IEEE Transactions on Information Theory 60 (11), 6844-6869, 2014 | 57 | 2014 |
Providing secrecy with lattice codes X He, A Yener 2008 46th annual Allerton conference on communication, control, and …, 2008 | 54 | 2008 |
MIMO wiretap channels with arbitrarily varying eavesdropper channel states X He, A Yener submitted to IEEE Transactions on Informaton Theory, Arxiv preprint arXiv …, 2010 | 52 | 2010 |
The gaussian many-to-one interference channel with confidential messages X He, A Yener IEEE Transactions on Information Theory 57 (5), 2730-2745, 2011 | 50 | 2011 |
K-user interference channels: Achievable secrecy rate and degrees of freedom X He, A Yener 2009 IEEE Information Theory Workshop on Networking and Information Theory …, 2009 | 48 | 2009 |
A new outer bound for the Gaussian interference channel with confidential messages X He, A Yener 2009 43rd Annual Conference on Information Sciences and Systems, 318-323, 2009 | 43 | 2009 |
Cooperative jamming: The tale of friendly interference for secrecy X He, A Yener Securing Wireless Communications at the Physical Layer, 65-88, 2010 | 41 | 2010 |
Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling X He, A Yener GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 41 | 2009 |
On the Energy-Delay Trade-off of a Two-Way Relay Network X He, A Yener the Conference on Information Sciences and Systems, CISS'08, 0 | 40* | |
On the equivocation region of relay channels with orthogonal components X He, A Yener the 41st Annual Asilomar Conference on Signals, Systems, and Computers …, 2007 | 35 | 2007 |