Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks
暂无分享,去创建一个
Qi Zhang | Quanzhong Li | Jiayin Qin | Qi Zhang | J. Qin | Quanzhong Li
[1] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[2] Olav Tirkkonen,et al. Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..
[3] Liang Liu,et al. Joint Transmit Beamforming and Receive Power Splitting for MISO SWIPT Systems , 2013, IEEE Transactions on Wireless Communications.
[4] Qi Zhang,et al. Secure Relay Beamforming for Simultaneous Wireless Information and Power Transfer in Nonregenerative Relay Networks , 2014, IEEE Transactions on Vehicular Technology.
[5] Wing-Kin Ma,et al. Optimum Performance Boundaries of OSTBC Based AF-MIMO Relay System With Energy Harvesting Receiver , 2013, IEEE Transactions on Signal Processing.
[6] Bayan S. Sharif,et al. Wireless Information and Power Transfer in Cooperative Networks With Spatially Random Relays , 2014, IEEE Transactions on Wireless Communications.
[7] Qi Zhang,et al. Beamforming in Non-Regenerative Two-Way Multi-Antenna Relay Networks for Simultaneous Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.
[8] Amir Beck,et al. A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..
[9] Daniel Pérez Palomar,et al. Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.
[10] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[11] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[12] Florian Roemer,et al. Sum-Rate Maximization in Two-Way AF MIMO Relaying: Polynomial Time Solutions to a Class of DC Programming Problems , 2012, IEEE Transactions on Signal Processing.
[13] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[14] Abraham Charnes,et al. Programming with linear fractional functionals , 1962 .
[15] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[16] Boubakeur Benahmed,et al. Semismooth Reformulation and Nonsmooth Newton's Method for Solving Nonlinear Semidefinite Programming , 2015, MCO.
[17] Bayan S. Sharif,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.
[18] Kin K. Leung,et al. On the Application of Cooperative Transmission to Secrecy Communications , 2012, IEEE Journal on Selected Areas in Communications.
[19] Shuzhong Zhang,et al. New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..
[20] Chengwen Xing,et al. MIMO Beamforming Designs With Partial CSI Under Energy Harvesting Constraints , 2013, IEEE Signal Processing Letters.
[21] Meixia Tao,et al. Robust Beamforming for Wireless Information and Power Transmission , 2012, IEEE Wireless Communications Letters.
[22] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .
[23] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[24] R. Horst,et al. DC Programming: Overview , 1999 .
[25] Jie Xu,et al. Multiuser MISO Beamforming for Simultaneous Wireless Information and Power Transfer , 2013, IEEE Transactions on Signal Processing.
[26] A. Lee Swindlehurst,et al. Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[27] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[28] Arkadi Nemirovski,et al. Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.
[29] Zhu Han,et al. On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.
[30] Wenbo Wang,et al. Iterative algorithm for secrecy guarantee with null space beamforming in two-way relay networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[31] Bruno Clerckx,et al. Joint Wireless Information and Energy Transfer in a Two-User MIMO Interference Channel , 2013, IEEE Transactions on Wireless Communications.
[32] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[33] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[34] Qingjiang Shi. Joint Beamforming And Power Splitting For Multi-User MISO SWIPT System , 2013, ArXiv.