Secure Beamforming in Downlink MIMO Nonorthogonal Multiple Access Networks
暂无分享,去创建一个
Quanzhong Li | Jiayin Qin | Qi Zhang | Yiqing Li | Miao Jiang | J. Qin | Quanzhong Li | Qi Zhang | Miao Jiang | Yiqing Li
[1] Qi Zhang,et al. Secure Beamforming in Downlink MISO Nonorthogonal Multiple Access Systems , 2017, IEEE Transactions on Vehicular Technology.
[2] Zhiguo Ding,et al. Nonorthogonal Multiple Access for 5G , 2018, 5G Networks: Fundamental Requirements, Enabling Technologies, and Operations Management.
[3] H. Vincent Poor,et al. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks , 2015, IEEE Communications Magazine.
[4] J. Malick,et al. Projection methods in conic optimization , 2011, 1103.1511.
[5] H. Vincent Poor,et al. A General MIMO Framework for NOMA Downlink and Uplink Transmission Based on Signal Alignment , 2015, IEEE Transactions on Wireless Communications.
[6] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[7] Andrea J. Goldsmith,et al. Joint Optimization of Power and Data Transfer in Multiuser MIMO Systems , 2016, IEEE Transactions on Signal Processing.
[8] Qi Zhang,et al. Secrecy Sum Rate Optimization for Downlink MIMO Nonorthogonal Multiple Access Systems , 2017, IEEE Signal Processing Letters.
[9] Qi Zhang,et al. Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks , 2016, IEEE Transactions on Vehicular Technology.
[10] Michael J. Todd,et al. The Ellipsoid Method: A Survey , 1980 .
[11] Michael J. Todd,et al. Feature Article - The Ellipsoid Method: A Survey , 1981, Oper. Res..
[12] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[13] Quanzhong Li,et al. Robust AN-Aided Secure Precoding for an AF MIMO Untrusted Relay System , 2017, IEEE Transactions on Vehicular Technology.
[14] Tamás Terlaky,et al. Interior Point Methods for Nonlinear Optimization , 2010 .
[15] Liu,et al. Enhancing the Physical Layer Security of Non-Orthogonal Multiple Access in Large-Scale Networks , 2016, IEEE Transactions on Wireless Communications.
[16] Gert R. G. Lanckriet,et al. On the Convergence of the Concave-Convex Procedure , 2009, NIPS.