暂无分享,去创建一个
Lajos Hanzo | Benoît Champagne | Qiang Li | Jiaxin Yang | YuLong Zou | L. Hanzo | Qiang Li | B. Champagne | Yulong Zou | Jiaxin Yang
[1] Yue Rong,et al. Robust Design for Linear Non-Regenerative MIMO Relays With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Tiejun Lv,et al. Robust Beamforming and Jamming for Secure AF Relay Networks with Multiple Eavesdroppers , 2014, 2014 IEEE Military Communications Conference.
[4] Ananthanarayanan Chockalingam,et al. Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI , 2013, 2013 IEEE International Conference on Communications (ICC).
[5] Lajos Hanzo,et al. Security Versus Reliability Analysis of Opportunistic Relaying , 2013, IEEE Transactions on Vehicular Technology.
[6] Xianda Zhang,et al. Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.
[7] R. Horst,et al. DC Programming: Overview , 1999 .
[8] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[9] Claude E. Shannon,et al. A Mathematical Theory of Communications , 1948 .
[10] Chengwen Xing,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Robust Joint Design of Linear Relay Precoder and Destination Equalizer for Dual-Hop Amplify-and , 2009 .
[11] Lajos Hanzo,et al. MIMO AF relaying security: Robust transceiver design in the presence of multiple eavesdroppers , 2015, 2015 IEEE International Conference on Communications (ICC).
[12] Zhiguo Ding,et al. Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..
[13] Daniel Pérez Palomar,et al. A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization , 2006, IEEE Transactions on Signal Processing.
[14] Gert R. G. Lanckriet,et al. On the Convergence of the Concave-Convex Procedure , 2009, NIPS.
[15] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.
[16] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[17] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[18] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[19] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[20] R. M. A. P. Rajatheva,et al. Secure Beamforming Design for Physical Layer Network Coding Based MIMO Two-Way Relaying , 2014, IEEE Communications Letters.
[21] Yue Rong,et al. A Unified Framework for Optimizing Linear Nonregenerative Multicarrier MIMO Relay Communication Systems , 2009, IEEE Transactions on Signal Processing.
[22] Jos F. Sturm,et al. A Matlab toolbox for optimization over symmetric cones , 1999 .
[23] Qiang Li,et al. Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.
[24] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[25] Lajos Hanzo,et al. Joint Optimization of Transceiver Matrices for MIMO-Aided Multiuser AF Relay Networks: Improving the QoS in the Presence of CSI Errors , 2016, IEEE Transactions on Vehicular Technology.
[26] Abraham Charnes,et al. Programming with linear fractional functionals , 1962 .
[27] Jian Huang,et al. QoS-Based Source and Relay Secure Optimization Design with Presence of Channel Uncertainty , 2013, IEEE Communications Letters.
[28] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[29] Xu Xiong. Information-theoretical security secret key agreement protocol , 2008 .
[30] L. Grippo,et al. Exact penalty functions in constrained optimization , 1989 .
[31] Feng Liu,et al. Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.
[32] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[33] Stephen P. Boyd,et al. Applications of second-order cone programming , 1998 .
[34] Stephen P. Boyd,et al. Semidefinite Programming , 1996, SIAM Rev..
[35] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[36] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[37] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[38] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[39] Jon W. Tolle,et al. Exact penalty functions in nonlinear programming , 1973, Math. Program..