Energy Efficiency for Proactive Eavesdropping in Cooperative Cognitive Radio Networks
暂无分享,去创建一个
Yao Ge | P. C. Ching | Yao Ge | P. Ching
[1] H. Vincent Poor,et al. Secure and Energy-Efficient Beamforming for Simultaneous Information and Energy Transfer , 2016, IEEE Transactions on Wireless Communications.
[2] Arkadi Nemirovski,et al. Lectures on modern convex optimization - analysis, algorithms, and engineering applications , 2001, MPS-SIAM series on optimization.
[3] Caijun Zhong,et al. Proactive Eavesdropping in Relaying Systems , 2017, IEEE Signal Processing Letters.
[4] I. Stancu-Minasian. Nonlinear Fractional Programming , 1997 .
[5] Zahra Mobini,et al. Proactive Eavesdropping via Jamming in Full-Duplex Multi-Antenna Systems: Beamforming Design and Antenna Selection , 2020, IEEE Transactions on Communications.
[6] Rui Zhang,et al. Jamming-Assisted Eavesdropping Over Parallel Fading Channels , 2019, IEEE Transactions on Information Forensics and Security.
[7] Jie Xu,et al. Proactive Eavesdropping Via Jamming for Rate Maximization Over Rayleigh Fading Channels , 2015, IEEE Wireless Communications Letters.
[8] Jie Xu,et al. Wireless Surveillance of Two-Hop Communications , 2017, ArXiv.
[9] Andreas Karlsson,et al. Matrix Analysis for Statistics , 2007, Technometrics.
[10] Rui Zhang,et al. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.
[11] Derrick Wing Kwan Ng,et al. Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks , 2020, IEEE Transactions on Communications.
[12] Caijun Zhong,et al. Multi-Antenna Wireless Legitimate Surveillance Systems: Design and Performance Analysis , 2017, IEEE Transactions on Wireless Communications.
[13] Hongbo Zhu,et al. Spectrum Sharing Incentive for Legitimate Wireless Information Surveillance , 2021, IEEE Transactions on Vehicular Technology.
[14] Zhi-Quan Luo,et al. An iteratively weighted MMSE approach to distributed sum-utility maximization for a MIMO interfering broadcast channel , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[15] Geoffrey Ye Li,et al. Joint Beamforming and Jamming Design for mmWave Information Surveillance Systems , 2018, IEEE Journal on Selected Areas in Communications.
[16] Chengwen Xing,et al. Energy Efficient Transmission in Multi-User MIMO Relay Channels With Perfect and Imperfect Channel State Information , 2017, IEEE Transactions on Wireless Communications.
[17] Ding Xu,et al. Legitimate Surveillance of Suspicious Communications With QoS Guarantees for Unsuspicious Users , 2020, IEEE Communications Letters.
[18] Erik G. Larsson,et al. The Sign-Definiteness Lemma and Its Applications to Robust Transceiver Optimization for Multiuser MIMO Systems , 2013, IEEE Transactions on Signal Processing.
[19] Fuhui Zhou,et al. Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT , 2016, IEEE Transactions on Wireless Communications.
[20] H. Vincent Poor,et al. Big Data Driven Wireless Communications: A Human-in-the-Loop Pushing Technique for 5G Systems , 2018, IEEE Wireless Communications.
[21] Wei Zhao,et al. Energy Efficiency of Proactive Eavesdropping for Multiple Links Wireless System , 2018, IEEE Access.
[22] Jie Xu,et al. Surveillance and Intervention of Infrastructure-Free Mobile Communications: A New Wireless Security Paradigm , 2016, IEEE Wireless Communications.
[23] Octavia A. Dobre,et al. A New Design Paradigm for Secure Full-Duplex Multiuser Systems , 2018, IEEE Journal on Selected Areas in Communications.
[24] Haijun Zhang,et al. Energy Efficiency of Proactive Cooperative Eavesdropping Over Multiple Suspicious Communication Links , 2019, IEEE Transactions on Vehicular Technology.
[25] Jie Xu,et al. Proactive Eavesdropping via Cognitive Jamming in Fading Channels , 2015, IEEE Transactions on Wireless Communications.
[26] Inkyu Lee,et al. Relay-Assisted Proactive Eavesdropping With Cooperative Jamming and Spoofing , 2018, IEEE Transactions on Wireless Communications.
[27] Qi Zhang,et al. Proactive Monitoring via Jamming in Amplify-and-Forward Relay Networks , 2017, IEEE Signal Processing Letters.
[28] Lajos Hanzo,et al. Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach , 2013, IEEE Transactions on Communications.
[29] Quanzhong Li,et al. Robust Proactive Monitoring via Jamming With Deterministically Bounded Channel Errors , 2018, IEEE Signal Processing Letters.
[30] Jie Xu,et al. Transmit Optimization for Symbol-Level Spoofing , 2018, IEEE Transactions on Wireless Communications.
[31] Qi Li,et al. Cooperative Relay-Assisted Proactive Eavesdropping for Wireless Information Surveillance Systems , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[32] He Chen,et al. Wireless Information Surveillance and Intervention Over Multiple Suspicious Links , 2018, IEEE Signal Processing Letters.
[33] Qi Zhang,et al. Proactive Monitoring Via Jamming for Rate Maximization Over MIMO Rayleigh Fading Channels , 2017, IEEE Communications Letters.
[34] Inkyu Lee,et al. Proactive Eavesdropping With Full-Duplex Relay and Cooperative Jamming , 2018, IEEE Transactions on Wireless Communications.
[35] Pei Li,et al. Proactive Eavesdropping via Jamming in Cognitive Radio Networks , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).