|
|
♠ H. Zhang, L. Duan, and R. Zhang, “Jamming-assisted proactive eavesdropping over two suspicious communication links,”IEEE Transactions on Wireless Communications, vol. 19, no. 7, pp. 4817-4830, July 2020. ♠ Y. Han, L. Duan, and R. Zhang, “Jamming-assisted eavesdropping over parallel fading channels,” IEEE Transactions on Information Forensics & Security, vol. 14, no. 9, pp. 2486-2499, September, 2019.
♠ J. Xu, K. Li, L. Duan, and R. Zhang, “Proactive eavesdropping via jamming over HARQ-based communications,” IEEE Global Communications Conference (Globecom), 2017.
♠ G. Ma, J. Xu, L. Duan, and R. Zhang, “Wireless surveillance of two-hop communications,” IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC), 2017.
♠ Y. Zeng and R. Zhang, “Wireless information surveillance via proactive eavesdropping with spoofing relay,” IEEE Journal of Selected Topics in Signal Processing, special issue on exploiting interference towards energy efficient
and secure wireless communications, vol. 10, no. 8, pp. 1449-1461, December 2016.
♠ Y. Zeng and R. Zhang, “Active eavesdropping via spoofing relay attack,” IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2016.
♠ J. Xu, L. Duan, and R. Zhang, “Proactive eavesdropping via cognitive jamming in fading channels,” IEEE Transactions on Wireless Communications, vol. 16, no. 5, pp. 2790-2806, May 2017.
♠ J. Xu, L. Duan, and R. Zhang, “Proactive eavesdropping via jamming for rate maximization over Rayleigh fading channels,” IEEE Wireless Communications Letters, vol. 5, no. 1, pp. 80-83, February 2016. |
|
|
♠ J. Xu, L. Duan, and R. Zhang, “Transmit optimization for symbol-level spoofing,” IEEE Transactions on Wireless Communications, vol. 17, no. 1, pp. 41-55, January 2018. ♠ J. Xu, L. Duan, and R. Zhang, “Fundamental rate limits of physical layer spoofing,” IEEE Wireless Communications Letters, vol. 6 , no. 2, pp.154-157, April 2017. |