Optimization for Maximizing Sum Secrecy Rate in MU-MISO SWIPT Systems
暂无分享,去创建一个
[1] Alister G. Burr,et al. Secrecy rate maximization for MISO multicasting SWIPT system with power splitting scheme , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[2] Qi Zhang,et al. Cooperative Jamming Aided Robust Secure Transmission for Wireless Information and Power Transfer in MISO Channels , 2015, IEEE Transactions on Communications.
[3] Hui Yu,et al. Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.
[4] Meng Zhang,et al. Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.
[5] Bruno Clerckx,et al. Joint Wireless Information and Energy Transfer in a Two-User MIMO Interference Channel , 2013, IEEE Transactions on Wireless Communications.
[6] Erik G. Larsson,et al. Simultaneous Information and Power Transfer for Broadband Wireless Systems , 2012, IEEE Transactions on Signal Processing.
[7] Qingling Zhang,et al. Eigenvalue Inequalities for Matrix Product , 2006, IEEE Transactions on Automatic Control.
[8] Mudhakar Srivatsa,et al. Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.
[9] K. Mayaram,et al. Efficient Far-Field Radio Frequency Energy Harvesting for Passively Powered Sensor Networks , 2008, IEEE Journal of Solid-State Circuits.
[10] Yongming Huang,et al. Secure Beamforming for SWIPT in Multiuser MISO Broadcast Channel With Confidential Messages , 2015, IEEE Communications Letters.
[11] Bin Wu,et al. Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming , 2016, 2016 IEEE International Conference on Communications (ICC).
[12] Meng Zhang,et al. IT ] 3 S ep 2 01 5 Secrecy Wireless Information and Power Transfer in OFDMA Systems , 2018 .
[13] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[14] Yingbin Liang,et al. Secure Communications via Physical-Layer and Information-Theoretic Techniques [Scanning the Issue] , 2015, Proc. IEEE.
[15] David P. Williamson,et al. Approximation algorithms for MAX-3-CUT and other problems via complex semidefinite programming , 2001, STOC '01.
[16] Yi Hong,et al. Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.
[17] Kim-Chuan Toh,et al. SDPT3 — a Matlab software package for semidefinite-quadratic-linear programming, version 3.0 , 2001 .
[18] Muhammad R. A. Khandaker,et al. Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.
[19] Xinmiao Zhang,et al. Wireless Security and Cryptography: Specifications and Implementations , 2007 .
[20] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[21] マチアス ウェクリン,et al. Apparatus for transmitting electrical energy inductively , 2003 .
[22] Meisam Razaviyayn,et al. Successive Convex Approximation: Analysis and Applications , 2014 .
[23] Takehiro Imura,et al. Maximizing Air Gap and Efficiency of Magnetic Resonant Coupling for Wireless Power Transfer Using Equivalent Circuit and Neumann Formula , 2011, IEEE Transactions on Industrial Electronics.
[24] W. X. Zhong,et al. Recent progress in mid-range wireless power transfer , 2012, 2012 IEEE Energy Conversion Congress and Exposition (ECCE).
[25] Arkadi Nemirovski,et al. Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.
[26] Naofal Al-Dhahir,et al. Artificial-Noise-Aided Secure MIMO Full-Duplex Relay Channels With Fixed-Power Transmissions , 2016, IEEE Communications Letters.
[27] Meng Zhang,et al. Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.
[28] Joonhyuk Kang,et al. Joint transceiver design for secure communication with power transfer , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[29] Joonhyuk Kang,et al. Secure Transmission in Downlink Cellular Network with a Cooperative Jammer , 2013, IEEE Wireless Communications Letters.
[30] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[31] Wenxing Zhong,et al. A Critical Review of Recent Progress in Mid-Range Wireless Power Transfer , 2014, IEEE Transactions on Power Electronics.
[32] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[33] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[34] M. Hata,et al. Empirical formula for propagation loss in land mobile radio services , 1980, IEEE Transactions on Vehicular Technology.