Secure beamforming method for artificial-noise-aided multiuser broadcast system with users of different importance under secrecy outage probability constraint
暂无分享,去创建一个
Li Yao | Jian Zhang | Youjiang Liu | Dalong Yang | Yongtao Qiu | Yudong He | Tao Cao | Youjiang Liu | Tao Cao | Yudong He | Li Yao | Jian Zhang | Yongtao Qiu | Dalong Yang
[1] Bo Wang,et al. Dirty-Paper Coding Based Secure Transmission for Multiuser Downlink in Cellular Communication Systems , 2017, IEEE Transactions on Vehicular Technology.
[2] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[3] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[4] Bo Wang,et al. Artificial Noise-Aided Secure Multicasting Design Under Secrecy Outage Constraint , 2017, IEEE Transactions on Communications.
[5] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[6] Mohamed-Slim Alouini,et al. On the Finite-SNR Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme under Secrecy Constraint , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).
[7] Ju Liu,et al. Efficient power allocation in downlink multi-cell multi-user NOMA networks , 2019, IET Commun..
[8] Ami Wiesel,et al. Zero-Forcing Precoding and Generalized Inverses , 2008, IEEE Transactions on Signal Processing.
[9] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.
[10] Emil Björnson,et al. Optimal Multiuser Transmit Beamforming: A Difficult Problem with a Simple Solution Structure [Lecture Notes] , 2014, IEEE Signal Processing Magazine.
[11] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[12] Zhiguo Ding,et al. Secure MISO-NOMA Transmission With Artificial Noise , 2018, IEEE Transactions on Vehicular Technology.
[13] Chaozhu Zhang,et al. Joint beamforming optimisation for NOMA-based wireless powered multi-pair two-way AF and DF relaying networks , 2019, IET Commun..
[14] Jun Liu,et al. Robust Beamforming Design for Secure Multiuser MISO Interference Channel , 2017, IEEE Communications Letters.
[15] Sanjay Dhar Roy,et al. Physical layer security in cognitive radio network with energy harvesting relay and jamming in the presence of direct link , 2018, IET Commun..
[16] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[17] Andrea J. Goldsmith,et al. On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming , 2006, IEEE Journal on Selected Areas in Communications.
[18] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2012, IEEE Trans. Inf. Forensics Secur..
[19] Jae-Mo Kang,et al. Deep Artificial Noise: Deep Learning-Based Precoding Optimization for Artificial Noise Scheme , 2020, IEEE Transactions on Vehicular Technology.
[20] Wei Xu,et al. Robust MMSE Beamforming for Multiuser MISO Systems With Limited Feedback , 2009, IEEE Signal Processing Letters.
[21] Ami Wiesel,et al. Linear precoding via conic optimization for fixed MIMO receivers , 2006, IEEE Transactions on Signal Processing.
[22] Anchare V. Babu,et al. Ensuring equal outage performance for down-link secondary users in full/half duplex cognitive NOMA systems , 2020, IET Commun..
[23] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[24] Pengcheng Mu,et al. Minimization of Secrecy Outage Probability With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels , 2020, IEEE Communications Letters.
[25] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[26] Trung Quang Duong,et al. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[27] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[28] Guan Gui,et al. Deep Learning-Inspired Message Passing Algorithm for Efficient Resource Allocation in Cognitive Radio Networks , 2019, IEEE Transactions on Vehicular Technology.
[29] Josef A. Nossek,et al. Linear transmit processing in MIMO communications systems , 2005, IEEE Transactions on Signal Processing.
[30] Zhen Yang,et al. Secure transmission over the wiretap channel using polar codes and artificial noise , 2017, IET Commun..
[31] Mounir Ghogho,et al. Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region , 2014, IET Commun..