暂无分享,去创建一个
[1] Anant Sahai,et al. Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.
[2] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[3] A. Lee Swindlehurst,et al. Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer , 2011, IEEE Transactions on Signal Processing.
[4] 张旗,et al. Robust Secure Transmission in MISO Simultaneous Wireless Information and Power Transfer System , 2015 .
[5] Rui Zhang,et al. Wireless powered communication: opportunities and challenges , 2014, IEEE Communications Magazine.
[6] João Barros,et al. Collision-free jamming for enhanced wireless secrecy , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[7] Kee Chaing Chua,et al. Secrecy Wireless Information and Power Transfer With MISO Beamforming , 2013, IEEE Transactions on Signal Processing.
[8] Esther M. Arkin,et al. Secure communication through jammers jointly optimized in geography and time , 2017, Pervasive Mob. Comput..
[9] Salman Durrani,et al. Secure Communication With a Wireless-Powered Friendly Jammer , 2014, IEEE Transactions on Wireless Communications.
[10] Esther M. Arkin,et al. Optimal placement of protective jammers for securing wireless transmissions in a geographic domain , 2015, IPSN '15.
[11] Lav R. Varshney,et al. Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.
[12] Michael Dinitz,et al. Maximizing Capacity in Arbitrary Wireless Networks in the SINR Model: Complexity and Game Theory , 2009, IEEE INFOCOM 2009.
[13] JeongGil Ko,et al. Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.
[14] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .
[15] Ali A. Nasir,et al. Wireless-Powered Relays in Cooperative Communications: Time-Switching Relaying Protocols and Throughput Analysis , 2013, IEEE Transactions on Communications.
[16] Esther M. Arkin,et al. Secure Communication through Jammers Jointly Optimized in Geography and Time , 2015, MobiHoc.
[17] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[18] Devdatt P. Dubhashi,et al. Concentration of Measure for the Analysis of Randomized Algorithms: Contents , 2009 .
[19] Hyungsik Ju,et al. Throughput Maximization in Wireless Powered Communication Networks , 2013, IEEE Trans. Wirel. Commun..
[20] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[21] A. Lee Swindlehurst,et al. Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[22] Martin Hoefer,et al. Online capacity maximization in wireless networks , 2013, J. Sched..
[23] Rui Zhang,et al. Wireless Information and Power Transfer: Architecture Design and Rate-Energy Tradeoff , 2012, IEEE Transactions on Communications.
[24] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[25] Alon Efrat,et al. Optimization Schemes for Protective Jamming , 2012, MobiHoc '12.
[26] Liang Liu,et al. Secrecy wireless information and power transfer in fading wiretap channel , 2014, 2014 IEEE International Conference on Communications (ICC).
[27] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[28] Fei Hu,et al. Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.
[29] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[30] H. Vincent Poor,et al. On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels , 2007, IEEE Transactions on Information Theory.
[31] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[32] Amitav Mukherjee,et al. Deploying multi-antenna energy-harvesting cooperative jammers in the MIMO wiretap channel , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[33] Sébastien Bubeck,et al. Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems , 2012, Found. Trends Mach. Learn..
[34] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[35] Rui Zhang,et al. O ct 2 01 2 Wireless Information Transfer with Opportunistic Energy Harvesting , 2013 .
[36] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.
[37] Qi Zhang,et al. Robust Secure Transmission in MISO Simultaneous Wireless Information and Power Transfer System , 2015, IEEE Transactions on Vehicular Technology.
[38] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[39] Joao Barros,et al. Jammer Selection Policies for Secure Wireless Networks , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).