Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints

[1]  Bo Wang,et al.  Two-step transmission with artificial noise for secure wireless SIMO communications , 2015, Science China Information Sciences.

[2]  Zesong Fei,et al.  Ergodic secrecy rate of two-user MISO interference channels with statistical CSI , 2014, Science China Information Sciences.

[3]  Yueming Cai,et al.  Secure Transmission Design and Performance Analysis for Cooperation Exploring Outdated CSI , 2014, IEEE Communications Letters.

[4]  Feng Liu,et al.  Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.

[5]  Yueming Cai,et al.  On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ , 2014, IEEE Communications Letters.

[6]  Lifeng Wang,et al.  Physical Layer Security of Maximal Ratio Combining in Two-Wave With Diffuse Power Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Kee Chaing Chua,et al.  Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[8]  Dongtang Ma,et al.  Robust Artificial Noise Aided Transmit Design for MISO Wiretap Channels with Channel Uncertainty , 2013, IEEE Communications Letters.

[9]  Jianhua Li,et al.  Strongly secure identity-based authenticated key agreement protocols in the escrow mode , 2013, Science China Information Sciences.

[10]  Jiaheng Wang,et al.  Robust MIMO precoding for the schatten norm based channel uncertainty sets , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[11]  Qiang Li,et al.  Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.

[12]  Hsuan-Jung Su,et al.  On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.

[13]  Xin Wang,et al.  Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.

[14]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[15]  Qiang Li,et al.  Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[16]  Qihui Wu,et al.  Effective capacity region of two-user opportunistic spectrum access , 2011, Science China Information Sciences.

[17]  Athina P. Petropulu,et al.  Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical Uncertainty , 2011, IEEE Transactions on Signal Processing.

[18]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[19]  Chong-Yung Chi,et al.  A semidefinite relaxation based conservative approach to robust transmit beamforming with probabilistic sinr constraints , 2010, 2010 18th European Signal Processing Conference.

[20]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[21]  Zhi-Quan Luo,et al.  Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.

[22]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[23]  Wei Zhang,et al.  MIMO-OFDM Channel Estimation in the Presence of Frequency Offsets , 2008, IEEE Transactions on Wireless Communications.

[24]  Stephen P. Boyd,et al.  Convex Optimization , 2004, IEEE Transactions on Automatic Control.

[25]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[26]  Qiang Li,et al.  A Safe Approximation Approach to Secrecy Outage Design for MIMO Wiretap Channels , 2014, IEEE Signal Processing Letters.

[27]  Shaoquan Jiang On τ-time secure key agreement , 2014, Science China Information Sciences.

[28]  Shuai Ma,et al.  Chance Constrained Robust Beamforming in Cognitive Radio Networks , 2013, IEEE Communications Letters.

[29]  Jiaheng Wang,et al.  Robust MIMO Precoding for Several Classes of Channel Uncertainty , 2013, IEEE Transactions on Signal Processing.

[30]  A. Leon-Garcia,et al.  Probability, statistics, and random processes for electrical engineering , 2008 .

[31]  A. Nemirovski,et al.  Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.