Expand icon Search icon File icon file Download

Browse by Journal

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 6.

Chu, Zheng and Hao, Wanming and Xiao, Pei and Mi, De and Liu, Zilong and Khalily, Mohsen and Kelly, James R and Feresidis, Alexandros P (2020) Secrecy Rate Optimization for Intelligent Reflecting Surface Assisted MIMO System. IEEE Transactions on Information Forensics and Security, 16. pp. 1655-1669. DOI https://doi.org/10.1109/tifs.2020.3038994

Rassouli, Borzoo and Gunduz, Deniz (2020) Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure. IEEE Transactions on Information Forensics and Security, 15. pp. 594-603. DOI https://doi.org/10.1109/tifs.2019.2903658

Belmega, E Veronica and Chorti, Arsenia (2017) Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches. IEEE Transactions on Information Forensics and Security, 12 (11). pp. 2611-2626. DOI https://doi.org/10.1109/TIFS.2017.2713342

Karpuk, David A and Chorti, Arsenia (2016) Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference. IEEE Transactions on Information Forensics and Security, 11 (8). pp. 1875-1887. DOI https://doi.org/10.1109/TIFS.2016.2563165

Kalantari, Ashkan and Gan Zheng and Zhen Gao and Zhu Han and Ottersten, Bjorn (2015) Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications. IEEE Transactions on Information Forensics and Security, 10 (9). pp. 1862-1874. DOI https://doi.org/10.1109/tifs.2015.2432732

Zhai, Xiaojun and Appiah, Kofi and Ehsan, Shoaib and Howells, Gareth and Hu, Huosheng and Gu, Dongbing and McDonald-Maier, Klaus D (2015) A Method for Detecting Abnormal Program Behavior on Embedded Devices. IEEE Transactions on Information Forensics and Security, 10 (8). pp. 1692-1704. DOI https://doi.org/10.1109/tifs.2015.2422674

This list was generated on Mon May 5 21:58:04 2025 BST.