Follow
Xiang He
Title
Cited by
Cited by
Year
Cooperation with an untrusted relay: A secrecy perspective
X He, A Yener
IEEE Transactions on Information Theory 56 (8), 3807-3827, 2010
4102010
Cooperative security at the physical layer: A summary of recent advances
R Bassily, E Ekrem, X He, E Tekin, J Xie, MR Bloch, S Ulukus, A Yener
IEEE Signal Processing Magazine 30 (5), 16-28, 2013
2352013
Two-hop secure communication using an untrusted relay: A case for cooperative jamming
X He, A Yener
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008
1802008
Two-hop secure communication using an untrusted relay
X He, A Yener
EURASIP Journal on Wireless Communications and Networking 2009, 9, 2009
1022009
Providing secrecy with structured codes: Two-user Gaussian channels
X He, A Yener
IEEE Transactions on Information Theory 60 (4), 2121-2138, 2014
942014
The role of feedback in two-way secure communication
X He, A Yener
the 42nd Annual Asilomar Conference on Signals, Systems, and Computers …, 2008
85*2008
Providing secrecy with structured codes: Tools and applications to two-user Gaussian channels
X He, A Yener
submitted to IEEE Transactions on Information Theory, 2009
792009
Strong secrecy and reliable byzantine detection in the presence of an untrusted relay
X He, A Yener
submitted to IEEE Transactions on Information Theory, Arxiv preprint arXiv …, 2010
732010
MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom
X He, A Khisti, A Yener
IEEE Transactions on Information Theory 59 (8), 4733-4745, 2013
612013
End-to-end secure multi-hop communication with untrusted relays
X He, A Yener
IEEE transactions on wireless communications 12 (1), 1-11, 2012
592012
MIMO wiretap channels with unknown and varying eavesdropper channel states
X He, A Yener
IEEE Transactions on Information Theory 60 (11), 6844-6869, 2014
572014
Providing secrecy with lattice codes
X He, A Yener
2008 46th annual Allerton conference on communication, control, and …, 2008
542008
MIMO wiretap channels with arbitrarily varying eavesdropper channel states
X He, A Yener
submitted to IEEE Transactions on Informaton Theory, Arxiv preprint arXiv …, 2010
522010
The gaussian many-to-one interference channel with confidential messages
X He, A Yener
IEEE Transactions on Information Theory 57 (5), 2730-2745, 2011
502011
K-user interference channels: Achievable secrecy rate and degrees of freedom
X He, A Yener
2009 IEEE Information Theory Workshop on Networking and Information Theory …, 2009
482009
A new outer bound for the Gaussian interference channel with confidential messages
X He, A Yener
2009 43rd Annual Conference on Information Sciences and Systems, 318-323, 2009
432009
Cooperative jamming: The tale of friendly interference for secrecy
X He, A Yener
Securing Wireless Communications at the Physical Layer, 65-88, 2010
412010
Secure degrees of freedom for Gaussian channels with interference: Structured codes outperform Gaussian signaling
X He, A Yener
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
412009
On the Energy-Delay Trade-off of a Two-Way Relay Network
X He, A Yener
the Conference on Information Sciences and Systems, CISS'08, 0
40*
On the equivocation region of relay channels with orthogonal components
X He, A Yener
the 41st Annual Asilomar Conference on Signals, Systems, and Computers …, 2007
352007
The system can't perform the operation now. Try again later.
Articles 1–20