Energy-Efficient Wireless Powered Secure Transmission With Cooperative Jamming for Public Transportation
暂无分享,去创建一个
Jun Li | Linqing Gui | Xiaobo Zhou | Feng Shu | Chunhua Yu | Jun Yu Li | Feifei Bao | F. Shu | Xiaobo Zhou | Linqing Gui | Feifei Bao | Chunhua Yu
[1] He Chen,et al. Cooperative Strategies for Wireless-Powered Communications: An Overview , 2018, IEEE Wireless Communications.
[2] Arkadi Nemirovski,et al. Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.
[3] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[4] Hyungsik Ju,et al. Optimal Resource Allocation in Full-Duplex Wireless-Powered Communication Network , 2014, IEEE Transactions on Communications.
[5] Xiang-Yang Li,et al. One More Tag Enables Fine-Grained RFID Localization and Tracking , 2018, IEEE/ACM Transactions on Networking.
[6] Gamantyo Hendrantoro,et al. Pathloss and shadowing characteristics in indoor environment at 2.4 GHz band , 2015, 2015 International Seminar on Intelligent Technology and Its Applications (ISITIA).
[7] Liyun Zhang,et al. Improving Physical Layer Security for MISO Systems via Using Artificial Noise , 2014, GLOBECOM 2014.
[8] Xiaohui Xie,et al. Utility-aware data transmission scheme for delay tolerant networks , 2016, Peer Peer Netw. Appl..
[9] Jun Li,et al. Low-Complexity and High-Resolution DOA Estimation for Hybrid Analog and Digital Massive MIMO Receive Array , 2017, IEEE Transactions on Communications.
[10] Feng Shu,et al. Artificial-Noise-Aided Secure Multicast Precoding for Directional Modulation Systems , 2017, IEEE Transactions on Vehicular Technology.
[11] Linqing Gui,et al. DV-Hop Localization With Protocol Sequence Based Access , 2018, IEEE Transactions on Vehicular Technology.
[12] Kamel Tourki,et al. Securing Untrusted RF-EH Relay Networks Using Cooperative Jamming Signals , 2017, IEEE Access.
[13] Ling Tang,et al. Wireless Power Transfer and Cooperative Jamming for Secrecy Throughput Maximization , 2016, IEEE Wireless Communications Letters.
[14] J. Magnus,et al. Matrix Differential Calculus with Applications in Statistics and Econometrics , 1991 .
[15] Abraham Charnes,et al. Programming with linear fractional functionals , 1962 .
[16] Qingqing Wu,et al. Wireless Powered Cooperative Jamming for Secure OFDM System , 2017, IEEE Transactions on Vehicular Technology.
[17] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[18] Kyoung-Jae Lee,et al. Optimal Beamforming Designs for Wireless Information and Power Transfer in MISO Interference Channels , 2015, IEEE Transactions on Wireless Communications.
[19] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[20] R. Horst,et al. DC Programming: Overview , 1999 .
[21] Daesik Hong,et al. New OFDM Channel Estimation with Dual-ICI Cancellation in Highly Mobile Channel , 2010, IEEE Transactions on Wireless Communications.
[22] Fu Xiao,et al. Surface Coverage Algorithm in Directional Sensor Networks for Three-Dimensional Complex Terrains , 2016 .
[23] Panlong Yang,et al. R-TTWD: Robust Device-Free Through-The-Wall Detection of Moving Human With WiFi , 2017, IEEE Journal on Selected Areas in Communications.
[24] Julian Cheng,et al. Robust MISO Beamforming With Cooperative Jamming for Secure Transmission From Perspectives of QoS and Secrecy Rate , 2018, IEEE Transactions on Communications.
[25] J. Magnus,et al. Matrix Differential Calculus with Applications in Statistics and Econometrics (Revised Edition) , 1999 .
[26] Feng Shu,et al. Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array , 2017, IEEE Journal on Selected Areas in Communications.
[27] Chao Zhai,et al. Cooperative Strategies for Wireless-Powered Communications , 2016, ArXiv.
[28] Qiang Li,et al. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.
[29] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[30] Rui Zhang,et al. Wireless powered communication: opportunities and challenges , 2014, IEEE Communications Magazine.
[31] Jun Li,et al. A Cramer–Rao Lower Bound of CSI-Based Indoor Localization , 2018, IEEE Transactions on Vehicular Technology.
[32] Jun Li,et al. Secure SWIPT for Directional Modulation-Aided AF Relaying Networks , 2018, IEEE Journal on Selected Areas in Communications.
[33] Zhetao Li,et al. Noise-Tolerant Wireless Sensor Networks Localization via Multinorms Regularized Matrix Completion , 2018, IEEE Transactions on Vehicular Technology.
[34] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[35] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[36] Jun Li,et al. Artificial-Noise-Aided Secure Transmission With Directional Modulation Based on Random Frequency Diverse Arrays , 2016, IEEE Access.