Secure Communication for Two-Way Relay Networks with Imperfect CSI
暂无分享,去创建一个
Ke Liu | Cong Sun | Dahu Zheng | Wenbao Ai
[1] Xiaoming Chen,et al. On Secrecy Performance of Multiantenna-Jammer-Aided Secure Communications With Imperfect CSI , 2016, IEEE Transactions on Vehicular Technology.
[2] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[3] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[4] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[5] Khairi Ashour Hamdi,et al. Improving Physical Layer Security of AF Relay Networks via Beam-Forming and Jamming , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[6] Wenbo Wang,et al. Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks , 2014, IEEE Transactions on Signal Processing.
[7] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[8] Jong-Ho Lee,et al. Optimal Power Allocation for Physical Layer Security in Multi-Hop DF Relay Networks , 2016, IEEE Transactions on Wireless Communications.
[9] Xiaoming Chen,et al. Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.
[10] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[11] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[12] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[13] Ya-Xiang Yuan,et al. Optimization Theory and Methods: Nonlinear Programming , 2010 .
[14] Yueming Cai,et al. Robust secure switching transmission in multi-antenna relaying systems: cooperative jamming or decode-and-forward beamforming , 2016, IET Commun..
[15] A. Lee Swindlehurst,et al. Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.
[16] Jian Huang,et al. QoS-Based Source and Relay Secure Optimization Design with Presence of Channel Uncertainty , 2013, IEEE Communications Letters.
[17] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[18] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[19] Nicholas Kolokotronis,et al. Improving physical layer security in DF relay networks via two-stage cooperative jamming , 2016, 2016 24th European Signal Processing Conference (EUSIPCO).
[20] Huiming Wang,et al. Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.
[21] Marius Pesavento,et al. Securing Relay Networks with Artificial Noise: An Error Performance-Based Approach , 2017, Entropy.
[22] Xiaoming Chen,et al. Mode Selection in MU-MIMO Downlink Networks: A Physical-Layer Security Perspective , 2015, IEEE Systems Journal.
[23] Eduard A. Jorswieck,et al. Energy Efficiency in Secure Multi-Antenna Systems , 2015, ArXiv.
[24] Shuzhong Zhang,et al. New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..
[25] Hui Yu,et al. Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.
[26] Keping Long,et al. Robust relay beamforming for multiple-antenna amplify-and-forward relay system in the presence of eavesdropper , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[27] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[28] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[29] Zhu Han,et al. Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying , 2016, IEEE Transactions on Wireless Communications.
[30] Hongbo Zhu,et al. Large System Secrecy Rate Analysis for SWIPT MIMO Wiretap Channels , 2016, IEEE Transactions on Information Forensics and Security.
[31] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[32] Stéphane Y. Le Goff,et al. Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel , 2015, IEEE Wireless Communications Letters.
[33] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[34] Bayan S. Sharif,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.