暂无分享,去创建一个
[1] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[2] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[3] Rui Zhang,et al. Wireless powered communication networks: an overview , 2015, IEEE Wireless Communications.
[4] Stéphane Y. Le Goff,et al. Simultaneous Wireless Information Power Transfer for MISO Secrecy Channel , 2015, IEEE Transactions on Vehicular Technology.
[5] Vincent W. S. Wong,et al. Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid , 2010, IEEE Transactions on Smart Grid.
[6] Branka Vucetic,et al. Wireless-powered cooperative communications via a hybrid relay , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).
[7] Zhu Han,et al. Physical Layer Security in MIMO Backscatter Wireless Systems , 2016, IEEE Transactions on Wireless Communications.
[8] Qiang Li,et al. Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.
[9] Nikos D. Sidiropoulos,et al. Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.
[10] Markku J. Juntti,et al. A Conic Quadratic Programming Approach to Physical Layer Multicasting for Large-Scale Antenna Arrays , 2014, IEEE Signal Processing Letters.
[11] Meixia Tao,et al. Coordinated Multicast Beamforming in Multicell Networks , 2012, IEEE Transactions on Wireless Communications.
[12] He Chen,et al. Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.
[13] Anant Sahai,et al. Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.
[14] Antti Tölli,et al. Fast Converging Algorithm for Weighted Sum Rate Maximization in Multicell MISO Downlink , 2012, IEEE Signal Processing Letters.
[15] Lav R. Varshney,et al. Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.
[16] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .
[17] Caijun Zhong,et al. Optimum Wirelessly Powered Relaying , 2015, IEEE Signal Processing Letters.
[18] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[19] Stéphane Y. Le Goff,et al. Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel , 2015, IEEE Wireless Communications Letters.
[20] A. Lee Swindlehurst,et al. Full Rank Solutions for the MIMO Gaussian Wiretap Channel With an Average Power Constraint , 2012, IEEE Transactions on Signal Processing.
[21] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[22] Hyungsik Ju,et al. Throughput Maximization in Wireless Powered Communication Networks , 2013, IEEE Trans. Wirel. Commun..
[23] Qiang Li,et al. Multicast Secrecy Rate Maximization for MISO Channels with Multiple Multi-Antenna Eavesdroppers , 2011, 2011 IEEE International Conference on Communications (ICC).
[24] Athina P. Petropulu,et al. On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.
[25] Muhammad R. A. Khandaker,et al. Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.
[26] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[27] Arumugam Nallanathan,et al. Enhancing Secrecy Rate in Cognitive Radio Networks via Stackelberg Game , 2016, IEEE Transactions on Communications.
[28] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[29] H. Vincent Poor,et al. Secrecy Rate Optimization for Secure Multicast Communications , 2016, IEEE Journal of Selected Topics in Signal Processing.
[30] Hyungsik Ju,et al. User cooperation in wireless powered communication networks , 2014, 2014 IEEE Global Communications Conference.
[31] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.
[32] Adeel Razi,et al. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.
[33] Kaibin Huang,et al. Enabling Wireless Power Transfer in Cellular Networks: Architecture, Modeling and Deployment , 2012, IEEE Transactions on Wireless Communications.
[34] Xiangyun Zhou,et al. Cutting the last wires for mobile communications by microwave power transfer , 2014, IEEE Communications Magazine.
[35] Qiang Li,et al. Optimal and Robust Transmit Designs for MISO Channel Secrecy by Semidefinite Programming , 2010, IEEE Transactions on Signal Processing.
[36] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[37] Qi Zhang,et al. Optimal Power Allocation for Multicarrier Secure Communications in Full-Duplex Decode-and-Forward Relay Networks , 2014, IEEE Communications Letters.
[38] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[39] Muhammad R. A. Khandaker,et al. Robust Power-Splitting SWIPT Beamforming for Broadcast Channels , 2016, IEEE Communications Letters.
[40] Chong-Yung Chi,et al. Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.
[41] Meixia Tao,et al. Massive MIMO Multicasting in Noncooperative Cellular Networks , 2013, IEEE Journal on Selected Areas in Communications.
[42] Stéphane Y. Le Goff,et al. Secrecy rate optimization for a MIMO secrecy channel based on Stackelberg game , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[43] Caijun Zhong,et al. Robust Resource Allocation for Secrecy Wireless Powered Communication Networks , 2016, IEEE Communications Letters.
[44] Daniel Pérez Palomar,et al. Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.
[45] Gordon P. Wright,et al. Technical Note - A General Inner Approximation Algorithm for Nonconvex Mathematical Programs , 1978, Oper. Res..
[46] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[47] A. Lee Swindlehurst,et al. Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).