A Survey of Optimization Approaches for Wireless Physical Layer Security
暂无分享,去创建一个
Dong Wang | Zhu Han | Bo Bai | Wenbo Zhao | Zhu Han | B. Bai | Wenbo Zhao | Dong Wang
[1] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.
[2] Li Sun,et al. Performance Study of Two-Hop Amplify-and-Forward Systems With Untrustworthy Relay Nodes , 2012, IEEE Transactions on Vehicular Technology.
[3] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[4] H. Vincent Poor,et al. MIMO Beamforming for Secure and Energy-Efficient Wireless Communication , 2017, IEEE Signal Processing Letters.
[5] S. Weber,et al. Transmit power minimization under secrecy capacity constraint in cooperative wireless communications , 2009, 2009 IEEE/SP 15th Workshop on Statistical Signal Processing.
[6] Zhu Han,et al. Physical Layer Security for Two-Way Untrusted Relaying With Friendly Jammers , 2012, IEEE Transactions on Vehicular Technology.
[7] Fadel F. Digham,et al. Power-efficient wireless OFDMA using limited-rate feedback , 2008, IEEE Transactions on Wireless Communications.
[8] Jianping Pan,et al. Minimizing Secrecy Outage Probability in Multiuser Wireless Systems With Stochastic Traffic , 2017, IEEE Transactions on Vehicular Technology.
[9] Taewon Hwang,et al. Energy Efficient Communication for Secure D2D Underlaid Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.
[10] Derrick Wing Kwan Ng,et al. Secure and Green SWIPT in Distributed Antenna Networks With Limited Backhaul Capacity , 2014, IEEE Transactions on Wireless Communications.
[11] Mehdi Bennis,et al. Performance of Transmit Antenna Selection Physical Layer Security Schemes , 2012, IEEE Signal Processing Letters.
[12] Wan Choi,et al. Multiuser Diversity for Secrecy Communications Using Opportunistic Jammer Selection: Secure DoF and Jammer Scaling Law , 2014, IEEE Transactions on Signal Processing.
[13] Huiming Wang,et al. Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity Design , 2015, IEEE Transactions on Vehicular Technology.
[14] Marco Baldi,et al. Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.
[15] Victor C. M. Leung,et al. Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.
[16] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[17] H. Vincent Poor,et al. Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization , 2011, IEEE Transactions on Information Forensics and Security.
[18] Inkyu Lee,et al. Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT Systems , 2017, IEEE Transactions on Information Forensics and Security.
[19] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[20] Qiang Li,et al. Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.
[21] Hui-Ming Wang,et al. Optimal Power Allocation for Artificial Noise Under Imperfect CSI Against Spatially Random Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.
[22] Xuemin Shen,et al. Secrecy-Based Energy-Efficient Data Offloading via Dual Connectivity Over Unlicensed Spectrums , 2016, IEEE Journal on Selected Areas in Communications.
[23] Jeffrey G. Andrews,et al. Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.
[24] Sang Wu Kim,et al. Adapting Rate and Power for Maximizing Secrecy Energy Efficiency , 2017, IEEE Communications Letters.
[25] Richard Demo Souza,et al. Energy Efficiency of Repetition Coding and Parallel Coding Relaying Under Partial Secrecy Regime , 2016, IEEE Access.
[26] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[27] S. Schaible. Fractional Programming. II, On Dinkelbach's Algorithm , 1976 .
[28] Aylin Yener,et al. Cooperation With an Untrusted Relay: A Secrecy Perspective , 2009, IEEE Transactions on Information Theory.
[29] Huiming Wang,et al. Secrecy Transmission With a Helper: To Relay or to Jam , 2015, IEEE Transactions on Information Forensics and Security.
[30] Huiming Wang,et al. Secure MISO Wiretap Channels With Multiantenna Passive Eavesdropper: Artificial Noise vs. Artificial Fast Fading , 2015, IEEE Transactions on Wireless Communications.
[31] Sheng Chen,et al. Secure Communications for Dual-Polarized MIMO Systems , 2017, IEEE Transactions on Signal Processing.
[32] Iain B. Collings,et al. Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.
[33] Vijay K. Bhargava,et al. Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.
[34] Zhu Han,et al. Energy Efficient Secure Communication Over Decode-and-Forward Relay Channels , 2015, IEEE Transactions on Communications.
[35] Emil Björnson,et al. A New Look at Dual-Hop Relaying: Performance Limits with Hardware Impairments , 2013, IEEE Transactions on Communications.
[36] Tran Trung Duy,et al. Relay Selection for Security Enhancement in Cognitive Relay Networks , 2015, IEEE Wireless Communications Letters.
[37] Björn E. Ottersten,et al. Physical Layer Security in Multibeam Satellite Systems , 2012, IEEE Transactions on Wireless Communications.
[38] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[39] Zhigang Cao,et al. Outage optimal subcarrier allocation for downlink secure OFDMA systems , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[40] H. Vincent Poor,et al. Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.
[41] Meixia Tao,et al. Relay Placement for Physical Layer Security: A Secure Connection Perspective , 2012, IEEE Communications Letters.
[42] Zhu Han,et al. Secure Green Communication via Untrusted Two-Way Relaying: A Physical Layer Approach , 2016, IEEE Transactions on Communications.
[43] A. Lee Swindlehurst,et al. On the Optimality of Linear Precoding for Secrecy in the MIMO Broadcast Channel , 2013, IEEE Journal on Selected Areas in Communications.
[44] Mustafa Cenk Gursoy. Secure Communication in the Low-SNR Regime , 2012, IEEE Transactions on Communications.
[45] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[46] Feng Liu,et al. Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.
[47] Le Thi Hoai An,et al. Recent Advances in DC Programming and DCA , 2013, Trans. Comput. Collect. Intell..
[48] Inkyu Lee,et al. Precoder Designs for MIMO Gaussian Multiple Access Wiretap Channels , 2017, IEEE Transactions on Vehicular Technology.
[49] Il-Min Kim,et al. Secure Transmission for Multiuser Relay Networks , 2015, IEEE Transactions on Wireless Communications.
[50] Farshad Lahouti,et al. Link Adaptation with Untrusted Relay Assignment: Design and Performance Analysis , 2013, IEEE Transactions on Communications.
[51] Lajos Hanzo,et al. Joint Relay and Jammer Selection Improves the Physical Layer Security in the Face of CSI Feedback Delays , 2015, IEEE Transactions on Vehicular Technology.
[52] Nicola Laurenti,et al. Power Allocation in Multiuser Parallel Gaussian Broadcast Channels With Common and Confidential Messages , 2016, IEEE Transactions on Communications.
[53] H. Vincent Poor,et al. An information theoretic framework for energy efficient secrecy , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[54] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[55] Halim Yanikomeroglu,et al. Robust Resource Allocation to Enhance Physical Layer Security in Systems With Full-Duplex Receivers: Active Adversary , 2017, IEEE Transactions on Wireless Communications.
[56] Jinhong Yuan,et al. Transmit Antenna Selection with Alamouti Coding and Power Allocation in MIMO Wiretap Channels , 2014, IEEE Transactions on Wireless Communications.
[57] Xiaoming Chen,et al. Large-Scale MIMO Relaying Techniques for Physical Layer Security: AF or DF? , 2015, IEEE Transactions on Wireless Communications.
[58] Lie-Liang Yang,et al. Adaptive cooperation schemes for energy efficient physical layer security , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[59] Zhu Han,et al. Achieving High Energy Efficiency and Physical-Layer Security in AF Relaying , 2016, IEEE Transactions on Wireless Communications.
[60] Feng Liu,et al. Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems , 2015, IEEE Transactions on Vehicular Technology.
[61] Robert Schober,et al. MIMO Wiretap Channels: Secure Transmission Using Transmit Antenna Selection and Receive Generalized Selection Combining , 2013, IEEE Communications Letters.
[62] Björn E. Ottersten,et al. Secrecy sum-rate for orthogonal random beamforming with opportunistic scheduling , 2013, IEEE Signal Processing Letters.
[63] Eduard A. Jorswieck,et al. Energy-efficient secure communications in MISO-SE systems , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.
[64] Derrick Wing Kwan Ng,et al. Multiobjective Resource Allocation for Secure Communication in Cognitive Radio Networks With Wireless Information and Power Transfer , 2014, IEEE Transactions on Vehicular Technology.
[65] A. Lee Swindlehurst,et al. Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.
[66] Urs Niesen,et al. Adaptive Alternating Minimization Algorithms , 2007, IEEE Transactions on Information Theory.
[67] Daniel Pérez Palomar,et al. A tutorial on decomposition methods for network utility maximization , 2006, IEEE Journal on Selected Areas in Communications.
[68] Derrick Wing Kwan Ng,et al. Energy-Efficient Resource Allocation for Secure OFDMA Systems , 2012, IEEE Transactions on Vehicular Technology.
[69] H. Vincent Poor,et al. Cooperative Beamforming and User Selection for Improving the Security of Relay-Aided Systems , 2015, IEEE Transactions on Communications.
[70] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.
[71] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[72] Javier López,et al. Relay selection for secure 5G green communications , 2015, Telecommun. Syst..
[73] Jong-Ho Lee,et al. Optimal Power Allocation for Physical Layer Security in Multi-Hop DF Relay Networks , 2016, IEEE Transactions on Wireless Communications.
[74] Xianda Zhang,et al. Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.
[75] Trung Quang Duong,et al. Optimal Transmission With Artificial Noise in MISOME Wiretap Channels , 2016, IEEE Transactions on Vehicular Technology.
[76] Yongming Huang,et al. Energy-Efficient Precoder Design for MIMO Wiretap Channels , 2014, IEEE Communications Letters.
[77] Symeon Chatzinotas,et al. Multicast Multigroup Precoding and User Scheduling for Frame-Based Satellite Communications , 2014, IEEE Transactions on Wireless Communications.
[78] Zhiguo Ding,et al. Secrecy Sum Rate Maximization in Non-orthogonal Multiple Access , 2016, IEEE Communications Letters.
[79] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[80] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[81] Taewon Hwang,et al. A Game With Randomly Distributed Eavesdroppers in Wireless Ad Hoc Networks: A Secrecy EE Perspective , 2017, IEEE Transactions on Vehicular Technology.
[82] Inkyu Lee,et al. Outage Constrained Robust Beamforming for Secure Broadcasting Systems With Energy Harvesting , 2016, IEEE Transactions on Wireless Communications.
[83] Chau Yuen,et al. Physical Layer Security of TAS/MRC With Antenna Correlation , 2013, IEEE Transactions on Information Forensics and Security.
[84] Adeel Razi,et al. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.
[85] Andrea J. Goldsmith,et al. Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks , 2004, IEEE Journal on Selected Areas in Communications.
[86] Aylin Yener,et al. Two-Hop Secure Communication Using an Untrusted Relay: A Case for Cooperative Jamming , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[87] Huiming Wang,et al. Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach , 2015, IEEE Transactions on Wireless Communications.
[88] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[89] Zhiguo Ding,et al. A General Relaying Transmission Protocol for MIMO Secrecy Communications , 2012, IEEE Transactions on Communications.
[90] Huiming Wang,et al. Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.
[91] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[92] Ananthanarayanan Chockalingam,et al. Decode-and-Forward Relay Beamforming for Secrecy with Finite-Alphabet Input , 2013, IEEE Communications Letters.
[93] Tao Liu,et al. Toward Green and Secure Communications over Massive MIMO Relay Networks: Joint Source and Relay Power Allocation , 2017, IEEE Access.
[94] Amitav Mukherjee,et al. Imbalanced Beamforming by a Multi-Antenna Source for Secure Utilization of an Untrusted Relay , 2013, IEEE Communications Letters.
[95] Tao Liu,et al. Energy-efficient power allocation for secure communications in large-scale MIMO relaying systems , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).
[96] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[97] Liang Liu,et al. Secrecy wireless information and power transfer in fading wiretap channel , 2014, 2014 IEEE International Conference on Communications (ICC).
[98] Markku J. Juntti,et al. Antenna Selection With Erroneous Covariance Matrices Under Secrecy Constraints , 2016, IEEE Transactions on Vehicular Technology.
[99] Geoffrey Ye Li,et al. A survey of energy-efficient wireless communications , 2013, IEEE Communications Surveys & Tutorials.
[100] Matti Latva-aho,et al. Enhanced Transmit Antenna Selection Scheme for Secure Throughput Maximization Without CSI at the Transmitter , 2015, IEEE Access.
[101] Xiang Zhang,et al. Partner Selection and Incentive Mechanism for Physical Layer Security , 2015, IEEE Transactions on Wireless Communications.
[102] Donald F. Towsley,et al. Multi-Antenna Transmission With Artificial Noise Against Randomly Distributed Eavesdroppers , 2015, IEEE Transactions on Communications.
[103] Saeedeh Parsaeefard,et al. Secure Robust Ergodic Uplink Resource Allocation in Relay-Assisted Cognitive Radio Networks , 2015, IEEE Transactions on Signal Processing.
[104] Kai-Kit Wong,et al. A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked Beamforming , 2012, IEEE Communications Letters.
[105] Il-Min Kim,et al. Optimal Cooperative Jamming for Multiuser Broadcast Channel with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[106] Matthew R. McKay,et al. Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.
[107] W. Luo,et al. User selection and resource allocation for secure multiuser MISO-OFDMA systems , 2011 .
[108] Derrick Wing Kwan Ng,et al. Power-Efficient and Secure WPCNs With Hardware Impairments and Non-Linear EH Circuit , 2017, IEEE Transactions on Communications.
[109] A. Lee Swindlehurst,et al. MIMO Interference Channel With Confidential Messages: Achievable Secrecy Rates and Precoder Design , 2011, IEEE Transactions on Information Forensics and Security.
[110] Derrick Wing Kwan Ng,et al. Secure Resource Allocation and Scheduling for OFDMA Decode-and-Forward Relay Networks , 2011, IEEE Transactions on Wireless Communications.
[111] Bhaskar D. Rao,et al. Training-based and semiblind channel estimation for MIMO systems with maximum ratio transmission , 2006, IEEE Transactions on Signal Processing.
[112] Kostas Berberidis,et al. Security-Aware Max–Min Resource Allocation in Multiuser OFDMA Downlink , 2015, IEEE Transactions on Information Forensics and Security.
[113] Jong-Ho Lee,et al. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.
[114] Tao Zhang,et al. Physical-Layer Security for Full Duplex Communications With Self-Interference Mitigation , 2016, IEEE Transactions on Wireless Communications.
[115] A. Lee Swindlehurst,et al. Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization , 2011, IEEE Transactions on Signal Processing.
[116] Chenxi Liu,et al. Location-Based Beamforming and Physical Layer Security in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.
[117] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[118] Il-Min Kim,et al. Joint Design of Optimal Cooperative Jamming and Power Allocation for Linear Precoding , 2014, IEEE Transactions on Communications.
[119] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[120] Yueming Cai,et al. Energy-efficient optimization for physical layer security in large-scale random CRNs , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[121] Hesham El Gamal,et al. The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.
[122] Trung Quang Duong,et al. Opportunistic secure transmission for wireless relay networks with modify-and-forward protocol , 2017, 2017 IEEE International Conference on Communications (ICC).
[123] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[124] A. Lee Swindlehurst,et al. Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[125] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[126] Elza Erkip,et al. Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[127] Jing Huang,et al. Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.
[128] Feng Liu,et al. Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.
[129] Yuanyuan Yang,et al. An Optimization Framework of Target Secrecy Rate and Power Allocation for SWIPT System , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[130] Caijun Zhong,et al. Opportunistic Relay Selection for Secrecy Enhancement in Cooperative Networks , 2015, IEEE Transactions on Communications.
[131] Kathrin Klamroth,et al. Biconvex sets and optimization with biconvex functions: a survey and extensions , 2007, Math. Methods Oper. Res..
[132] Björn E. Ottersten,et al. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering , 2015, IEEE Transactions on Wireless Communications.
[133] Shuai Ma,et al. Outage Constrained Robust Secure Transmission for MISO Wiretap Channels , 2013, IEEE Transactions on Wireless Communications.
[134] Yaming Wang,et al. Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.
[135] Andrew R. Conn,et al. Nonlinear programming via an exact penalty function: Asymptotic analysis , 1982, Math. Program..
[136] Amir Beck,et al. A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..
[137] Meixia Tao,et al. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-Based Broadband Wireless Networks , 2011, IEEE Transactions on Information Forensics and Security.
[138] George K. Karagiannidis,et al. Secure Multiuser Communications in Multiple Amplify-and-Forward Relay Networks , 2014, IEEE Transactions on Communications.
[139] Xuelong Li,et al. Secrecy Outage and Diversity Analysis of Cognitive Radio Systems , 2014, IEEE Journal on Selected Areas in Communications.
[140] Hui Yu,et al. Robust Beamforming Design for Sum Secrecy Rate Optimization in MU-MISO Networks , 2015, IEEE Transactions on Information Forensics and Security.
[141] Derrick Wing Kwan Ng,et al. Energy-efficient resource allocation in multi-cell OFDMA systems with limited backhaul capacity , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[142] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[143] Jianhua Ge,et al. Joint Cooperative Beamforming and Artificial Noise Design for Secrecy Sum Rate Maximization in Two-Way AF Relay Networks , 2014, IEEE Communications Letters.
[144] A. Lee Swindlehurst,et al. On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling , 2014, IEEE Communications Letters.
[145] Sumei Sun,et al. Power Efficient Resource Allocation for Downlink OFDMA Relay Cellular Networks , 2012, IEEE Transactions on Signal Processing.
[146] Xiaofeng Tao,et al. Secrecy Outage on Transmit Antenna Selection With Weighting Errors at Maximal-Ratio Combiners , 2015, IEEE Communications Letters.
[147] Haji M. Furqan,et al. Enhancing the Security Performance of OSTBC Using Pre-Equalicodization , 2017, 2017 International Conference on Frontiers of Information Technology (FIT).
[148] Sennur Ulukus,et al. Wireless Physical-Layer Security: Lessons Learned From Information Theory , 2015, Proceedings of the IEEE.
[149] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[150] Zhi Chen,et al. Robust energy-efficient transmit design for misome wiretap channels , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[151] Shi Jin,et al. On the Secure Spectral-Energy Efficiency Tradeoff in Random Cognitive Radio Networks , 2016, IEEE Journal on Selected Areas in Communications.
[152] Wenbo Wang,et al. Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems , 2013, IEEE Transactions on Information Forensics and Security.
[153] Inkyu Lee,et al. Secrecy Outage Minimization for Wireless Powered Communication Networks with an Energy Harvesting Jammer , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[154] I. Stancu-Minasian. Nonlinear Fractional Programming , 1997 .
[155] Yongming Huang,et al. Cooperative Precoding for Wireless Energy Transfer and Secure Cognitive Radio Coexistence Systems , 2017, IEEE Signal Processing Letters.
[156] Derrick Wing Kwan Ng,et al. Resource allocation for secure communication in systems with wireless information and power transfer , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[157] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[158] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[159] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[160] Matti Latva-aho,et al. Secrecy Analysis of Transmit Antenna Selection Cooperative Schemes With No Channel State Information at the Transmitter , 2015, IEEE Transactions on Communications.
[161] H. Vincent Poor,et al. Cooperative Transmission for Relay Networks Based on Second-Order Statistics of Channel State Information , 2010, IEEE Transactions on Signal Processing.
[162] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[163] Fengchao Zhu,et al. Improving Physical-Layer Security for CRNs Using SINR-Based Cooperative Beamforming , 2016, IEEE Transactions on Vehicular Technology.
[164] Bo Wang,et al. Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint , 2015, IEEE Communications Letters.
[165] Richard Demo Souza,et al. On the Secure Energy Efficiency of TAS/MRC With Relaying and Jamming Strategies , 2017, IEEE Signal Processing Letters.
[166] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[167] Mokhtar S. Bazaraa,et al. Nonlinear Programming: Theory and Algorithms , 1993 .
[168] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[169] Pingzhi Fan,et al. Asymptotic Studies for the Impact of Antenna Selection on Secure Two-Way Relaying Communications with Artificial Noise , 2014, IEEE Transactions on Wireless Communications.
[170] Iain B. Collings,et al. Transmit Antenna Selection for Security Enhancement in MIMO Wiretap Channels , 2013, IEEE Transactions on Communications.
[171] Derrick Wing Kwan Ng,et al. Joint Beamforming and Power Allocation for Secrecy in Peer-to-Peer Relay Networks , 2015, IEEE Transactions on Wireless Communications.
[172] Lie-Liang Yang,et al. Transmitter Precoding-Aided Spatial Modulation for Secrecy Communications , 2016, IEEE Transactions on Vehicular Technology.
[173] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[174] Shlomo Shamai,et al. Multiple-Input Multiple-Output Gaussian Broadcast Channels With Confidential Messages , 2009, IEEE Transactions on Information Theory.
[175] John S. Thompson,et al. Power allocation for cooperative-based jamming in wireless networks with secrecy constraints , 2010, 2010 IEEE Globecom Workshops.
[176] Mérouane Debbah,et al. Relay Selection Schemes for Dual-Hop Networks under Security Constraints with Multiple Eavesdroppers , 2013, IEEE Transactions on Wireless Communications.
[177] Y. Nesterov. Semidefinite relaxation and nonconvex quadratic optimization , 1998 .
[178] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[179] Jehad M. Hamamreh,et al. OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.
[180] Yu Gong,et al. Dual Antenna Selection in Secure Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.
[181] Xiaoming Chen,et al. Optimal Power Allocation for a Massive MIMO Relay Aided Secure Communication , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[182] Leonard J. Cimini,et al. Antenna Selection for Energy-Efficient MIMO Transmission , 2012, IEEE Wireless Communications Letters.
[183] Mikael Skoglund,et al. Energy Efficiency Analysis of Cooperative Jamming in Cognitive Radio Networks With Secrecy Constraints , 2015, IEEE Wireless Communications Letters.
[184] Muhammad Fainan Hanif,et al. Efficient Algorithm for Selecting Secrecy Rate Maximizing Antennas , 2013, IEEE Communications Letters.
[185] Zhu Han,et al. Secure Satellite Communication Systems Design With Individual Secrecy Rate Constraints , 2011, IEEE Transactions on Information Forensics and Security.
[186] Huiming Wang,et al. Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.
[187] Yueming Cai,et al. Robust secure switching transmission in multi-antenna relaying systems: cooperative jamming or decode-and-forward beamforming , 2016, IET Commun..
[188] Hsueh-Jyh Li,et al. Effect of Feedback Delay on Secure Cooperative Networks with Joint Relay and Jammer Selection , 2013, IEEE Wireless Communications Letters.
[189] A. Lee Swindlehurst,et al. Dirty Paper Coding versus Linear GSVD-Based Precoding in MIMO Broadcast Channel with Confidential Messages , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[190] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[191] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[192] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[193] Peng Ning,et al. The security of link signature: A view from channel models , 2014, 2014 IEEE Conference on Communications and Network Security.
[194] Jing Yang,et al. Transmission with Energy Harvesting Nodes in Fading Wireless Channels: Optimal Policies , 2011, IEEE Journal on Selected Areas in Communications.
[195] Christian Fager,et al. On the impact of hardware impairments on massive MIMO , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[196] Il-Min Kim,et al. Optimal Power Allocation for Secure Multicarrier Relay Systems , 2011, IEEE Transactions on Signal Processing.
[197] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[198] Ender Tekin,et al. The Gaussian Multiple Access Wire-Tap Channel , 2006, IEEE Transactions on Information Theory.
[199] Geoffrey Ye Li,et al. Utility-based resource allocation and scheduling in OFDM-based wireless broadband networks , 2005, IEEE Commun. Mag..
[200] Tho Le-Ngoc,et al. Physical layer security in wireless cooperative relay networks: state of the art and beyond , 2015, IEEE Communications Magazine.
[201] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[202] Kai-Kit Wong,et al. Secrecy and Energy Efficiency in Massive MIMO Aided Heterogeneous C-RAN: A New Look at Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.
[203] Daniel Pérez Palomar,et al. Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.
[204] Meng Zhang,et al. Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.
[205] Wei-Ping Zhu,et al. Energy efficient optimization for physical layer security in cognitive relay networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[206] Matthew R. McKay,et al. On the Design of Artificial-Noise-Aided Secure Multi-Antenna Transmission in Slow Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[207] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[208] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[209] Mohamed-Slim Alouini,et al. On Secure NOMA Systems With Transmit Antenna Selection Schemes , 2017, IEEE Access.
[210] Zhu Han,et al. Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy , 2017, IEEE Transactions on Wireless Communications.
[211] Mohamed-Slim Alouini,et al. On the Jamming Power Allocation for Secure Amplify-and-Forward Relaying via Cooperative Jamming , 2013, IEEE Journal on Selected Areas in Communications.
[212] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[213] Derrick Wing Kwan Ng,et al. Resource Allocation for a Massive MIMO Relay Aided Secure Communication , 2016, IEEE Transactions on Information Forensics and Security.
[214] Yongming Huang,et al. Secrecy Performance of Transmit Antenna Selection for MIMO Relay Systems With Outdated CSI , 2018, IEEE Transactions on Communications.
[215] Ya-Feng Liu,et al. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.
[216] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[217] Suhas N. Diggavi,et al. Great expectations: the value of spatial diversity in wireless networks , 2004, Proceedings of the IEEE.
[218] Jehad M. Hamamreh,et al. On physical-layer concepts and metrics in secure signal transmission , 2017, Phys. Commun..
[219] Markku J. Juntti,et al. On Linear Precoding Strategies for Secrecy Rate Maximization in Multiuser Multiantenna Wireless Networks , 2014, IEEE Transactions on Signal Processing.
[220] Jae-Mo Kang,et al. Joint Design of Optimal Precoding and Cooperative Jamming for Multiuser Secure Broadcast Systems , 2017, IEEE Transactions on Vehicular Technology.
[221] H. Vincent Poor,et al. Power Allocation for Artificial-Noise Secure MIMO Precoding Systems , 2014, IEEE Transactions on Signal Processing.
[222] A. Lee Swindlehurst,et al. Secure Communication Via an Untrusted Non-Regenerative Relay in Fading Channels , 2013, IEEE Transactions on Signal Processing.
[223] Carles Padró,et al. Information Theoretic Security , 2013, Lecture Notes in Computer Science.
[224] Derrick Wing Kwan Ng,et al. Power efficient and secure multiuser communication systems with wireless information and power transfer , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[225] Eduard A. Jorswieck,et al. Energy Efficiency of Confidential Multi-Antenna Systems With Artificial Noise and Statistical CSI , 2016, IEEE Journal of Selected Topics in Signal Processing.
[226] H. Vincent Poor,et al. Outage capacity and partial secrecy for energy efficient physical layer security in Gaussian fading channels , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[227] Yongming Huang,et al. Secure Beamforming Design for SWIPT in MISO Broadcast Channel With Confidential Messages and External Eavesdroppers , 2016, IEEE Transactions on Wireless Communications.
[228] Zhu Han,et al. Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective , 2017, IEEE Transactions on Communications.
[229] Tiejun Lv,et al. Secrecy Transmit Beamforming for Heterogeneous Networks , 2015, IEEE Journal on Selected Areas in Communications.
[230] Inkyu Lee,et al. Secrecy Performance Optimization for Wireless Powered Communication Networks With an Energy Harvesting Jammer , 2017, IEEE Transactions on Communications.
[231] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[232] Zhi Chen,et al. Artificial Noise Aided Energy Efficiency Optimization in MIMOME System With SWIPT , 2017, IEEE Communications Letters.
[233] Costas N. Georghiades,et al. Secrecy Capacity per Unit Cost , 2013, IEEE Journal on Selected Areas in Communications.
[234] Vincent K. N. Lau,et al. On the Design of Secure Non-Orthogonal Multiple Access Systems , 2016, IEEE Journal on Selected Areas in Communications.
[235] Ness B. Shroff,et al. Secrecy outage capacity of fading channels , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[236] Kamel Tourki,et al. AN-Aided Relay-Selection Scheme for Securing Untrusted RF-EH Relay Systems , 2017, IEEE Transactions on Green Communications and Networking.
[237] Le Thi Hoai An,et al. A new efficient algorithm based on DC programming and DCA for clustering , 2007, J. Glob. Optim..
[238] Aylin Yener,et al. The role of an untrusted relay in secret communication , 2008, 2008 IEEE International Symposium on Information Theory.
[239] Eduard A. Jorswieck,et al. Weak Secrecy in the Multiway Untrusted Relay Channel With Compute-and-Forward , 2014, IEEE Transactions on Information Forensics and Security.
[240] Zhi Ding,et al. On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited Feedback , 2011, IEEE Transactions on Wireless Communications.
[241] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.
[242] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.
[243] Donald C. Cox,et al. Correlation analysis based on MIMO channel measurements in an indoor environment , 2003, IEEE J. Sel. Areas Commun..
[244] Sennur Ulukus,et al. Secure broadcasting using multiple antennas , 2010, Journal of Communications and Networks.
[245] Jinho Choi,et al. Transmit power minimization beamforming via amplify-and-forward relays in wireless networks with multiple eavesdroppers , 2014, 2014 IEEE International Conference on Communications (ICC).
[246] Julio López,et al. Application of the sequential parametric convex approximation method to the design of robust trusses , 2017, J. Glob. Optim..
[247] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[248] Trung Q. Duong,et al. Physical Layer Security in Cooperative Energy Harvesting Networks With a Friendly Jammer , 2017, IEEE Wireless Communications Letters.
[249] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[250] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.
[251] Mohsen Guizani,et al. Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.
[252] Hlaing Minn,et al. Hybrid Analog–Digital Precoding Design for Secrecy mmWave MISO-OFDM Systems , 2017, IEEE Transactions on Communications.
[253] Derrick Wing Kwan Ng,et al. Multiobjective Resource Allocation for Secure Communication in Cognitive Radio Networks With Wireless Information and Power Transfer , 2016, IEEE Transactions on Vehicular Technology.
[254] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[255] Liang Zhong,et al. Iterative Distributed Minimum Total MSE Approach for Secure Communications in MIMO Interference Channels , 2016, IEEE Transactions on Information Forensics and Security.
[256] Xiangyun Zhou,et al. On the placement of RF energy harvesting node in wireless networks with secrecy considerations , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[257] Chau Yuen,et al. Energy Efficiency Tradeoff Mechanism Towards Wireless Green Communication: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[258] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[259] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[260] Symeon Chatzinotas,et al. Distributed Optimization for Coordinated Beamforming in Multicell Multigroup Multicast Systems: Power Minimization and SINR Balancing , 2017, IEEE Transactions on Signal Processing.
[261] Trung Quang Duong,et al. Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI , 2015, IEEE Transactions on Communications.
[262] Alessio Zappone,et al. Optimal Energy-Efficient Design of Confidential Multiple-Antenna Systems , 2018, IEEE Transactions on Information Forensics and Security.
[263] Jing Huang,et al. Secure Transmission with Optimal Power Allocation in Untrusted Relay Networks , 2014, IEEE Wireless Communications Letters.
[264] Shihao Yan,et al. Location-Based Beamforming for Enhancing Secrecy in Rician Wiretap Channels , 2016, IEEE Transactions on Wireless Communications.
[265] Ha H. Nguyen,et al. Joint Optimization of Source Power Allocation and Cooperative Beamforming for SC-FDMA Multi-User Multi-Relay Networks , 2013, IEEE Transactions on Communications.
[266] Yuan-Pei Lin,et al. Secure Transmission Using MIMO Precoding , 2014, IEEE Transactions on Information Forensics and Security.
[267] Ranjan Bose,et al. Resource Allocation for Secure Multicarrier AF Relay System Under Total Power Constraint , 2015, IEEE Communications Letters.
[268] Xiaoming Chen,et al. Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks with QoS Guarantee , 2013, IEEE Communications Letters.
[269] Shuzhong Zhang,et al. New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..
[270] A. Lee Swindlehurst,et al. User selection in multiuser MIMO systems with secrecy considerations , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.
[271] Kwok Hung Li,et al. Generalized Relay Selection for Improved Security in Cooperative DF Relay Networks , 2016, IEEE Wireless Communications Letters.
[272] Xiangyun Zhou,et al. Base Station Cooperation for Confidential Broadcasting in Multi-Cell Networks , 2015, IEEE Transactions on Wireless Communications.
[273] Andrea J. Goldsmith,et al. Capacity limits of MIMO channels , 2003, IEEE J. Sel. Areas Commun..
[274] Jinhong Yuan,et al. Confidential Broadcasting via Linear Precoding in Non-Homogeneous MIMO Multiuser Networks , 2014, IEEE Transactions on Communications.
[275] Robert Schober,et al. Combined relay selection and cooperative beamforming for physical layer security , 2012, Journal of Communications and Networks.
[276] Muhammad R. A. Khandaker,et al. Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.
[277] Fan Wu,et al. Cross-Layer Scheduling for OFDMA-Based Cognitive Radio Systems With Delay and Security Constraints , 2015, IEEE Transactions on Vehicular Technology.
[278] Derrick Wing Kwan Ng,et al. Multi-objective beamforming for secure communication in systems with wireless information and power transfer , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[279] Huiming Wang,et al. Opportunistic Jamming for Enhancing Security: Stochastic Geometry Modeling and Analysis , 2016, IEEE Transactions on Vehicular Technology.
[280] A. Lee Swindlehurst,et al. Joint transmit design and node selection for one-way and two-way untrusted relay channels , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[281] Marwan Krunz,et al. Exploiting Full-Duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks , 2016, IEEE Transactions on Communications.
[282] Derrick Wing Kwan Ng,et al. Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.
[283] Wei-Ping Zhu,et al. Energy efficient beamforming for secure communication in cognitive radio networks , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).