Fengzhong Qu

Fengzhong Qu

Contact Details

Name
Fengzhong Qu
Affiliation
Location

Pubs By Year

Pub Categories

 
Mathematics - Information Theory (1)
 
Computer Science - Information Theory (1)

Publications Authored By Fengzhong Qu

To improve national security, government agencies have long been committed to enforcing powerful surveillance measures on suspicious individuals or communications. In this paper, we consider a wireless legitimate surveillance system, where a full-duplex multi-antenna legitimate monitor aims to eavesdrop on a dubious communication link between a suspicious pair via proactive jamming. Assuming that the legitimate monitor can successfully overhear the suspicious information only when its achievable data rate is no smaller than that of the suspicious receiver, the key objective is to maximize the eavesdropping non-outage probability by joint design of the jamming power, receive and transmit beamformers at the legitimate monitor. Read More