Related references
Note: Only part of the references are listed.Optimized Power Control for Massive MIMO With Underlaid D2D Communications
Amin Ghazanfari et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2019)
Vulnerabilities of Massive MIMO Systems to Pilot Contamination Attacks
Berk Akgun et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Data-Aided Secure Massive MIMO Transmission Under the Pilot Contamination Attack
Yongpeng Wu et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2019)
Secure Massive MIMO With the Artificial Noise-Aided Downlink Training
Nam-Phong Nguyen et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)
On Detection and Mitigation of Reused Pilots in Massive MIMO Systems
Jitendra K. Tugnait
IEEE TRANSACTIONS ON COMMUNICATIONS (2018)
Pilot Spoofing Attack Detection and Countermeasure
Jitendra K. Tugnait
IEEE TRANSACTIONS ON COMMUNICATIONS (2018)
Jamming-Resistant Receivers for the Massive MIMO Uplink
Tan Tai Do et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Optimal Pilot and Payload Power Control in Single-Cell Massive MIMO Systems
Hei Victor Cheng et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2017)
Massive MIMO Networks: Spectral, Energy, and Hardware Efficiency
Emil Bjornson et al.
FOUNDATIONS AND TRENDS IN SIGNAL PROCESSING (2017)
Massive MIMO: Ten Myths and One Critical Question
Emil Bjornson et al.
IEEE COMMUNICATIONS MAGAZINE (2016)
Secure Transmission Against Pilot Spoofing Attack: A Two-Way Training-Based Scheme
Qi Xiong et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Resource Allocation for a Massive MIMO Relay Aided Secure Communication
Jian Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
Subverting Massive MIMO by Smart Jamming
Hessam Pirzadeh et al.
IEEE WIRELESS COMMUNICATIONS LETTERS (2016)
Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks
Dzevdan Kapetanovic et al.
IEEE COMMUNICATIONS MAGAZINE (2015)
What Will 5G Be?
Jeffrey G. Andrews et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2014)
On the Vulnerabilities of CSI in MIMO Wireless Communication Systems
Rob Miller et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)
Pilot Contamination for Active Eavesdropping
Xiangyun Zhou et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)
Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas
Thomas L. Marzetta
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2010)
Power control by geometric programming
Mung Chiang et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2007)