Sum Secrecy Rate Maximization for Full-Duplex Two-Way Relay Networks Using Alamouti-Based Rank-Two Beamforming
暂无分享,去创建一个
Dong Han | Qiang Li | Wing-Kin Ma | Wing-Kin Ma | Qiang Li | Dong-Wan Han
[1] Siavash M. Alamouti,et al. A simple transmit diversity technique for wireless communications , 1998, IEEE J. Sel. Areas Commun..
[2] Yu Gong,et al. Physical Layer Network Security in the Full-Duplex Relay System , 2015, IEEE Transactions on Information Forensics and Security.
[3] Qi Zhang,et al. Optimal and Suboptimal Full-Duplex Secure Beamforming Designs for MISO Two-Way Communications , 2015, IEEE Wireless Communications Letters.
[4] Derrick Wing Kwan Ng,et al. Multi-Objective Optimization for Robust Power Efficient and Secure Full-Duplex Wireless Communication Systems , 2015, IEEE Transactions on Wireless Communications.
[5] Sachin Katti,et al. Full duplex radios , 2013, SIGCOMM.
[6] Caijun Zhong,et al. Wireless Information and Power Transfer With Full Duplex Relaying , 2014, IEEE Transactions on Communications.
[7] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[8] Ya-Feng Liu,et al. Transmit Solutions for MIMO Wiretap Channels using Alternating Optimization , 2013, IEEE Journal on Selected Areas in Communications.
[9] Caijun Zhong,et al. Spatial-Modulation Based Wireless Information and Power Transfer with Full Duplex Relaying , 2018, 2018 IEEE International Conference on Communications (ICC).
[10] Ying-Chang Liang,et al. Optimal beamforming for two-way multi-antenna relay channel with analogue network coding , 2008, IEEE Journal on Selected Areas in Communications.
[11] Yurii Nesterov,et al. Introductory Lectures on Convex Optimization - A Basic Course , 2014, Applied Optimization.
[12] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[13] Gan Zheng,et al. Joint Beamforming Optimization and Power Control for Full-Duplex MIMO Two-Way Relay Channel , 2014, IEEE Transactions on Signal Processing.
[14] Daniel Pérez Palomar,et al. Rank-Constrained Separable Semidefinite Programming With Applications to Optimal Beamforming , 2010, IEEE Transactions on Signal Processing.
[15] Rui Zhang,et al. Full-Duplex Wireless-Powered Relay With Self-Energy Recycling , 2014, IEEE Wireless Communications Letters.
[16] Hyungsik Ju,et al. Optimal Resource Allocation in Full-Duplex Wireless-Powered Communication Network , 2014, IEEE Transactions on Communications.
[17] Derrick Wing Kwan Ng,et al. Simultaneous wireless information and power transfer in modern communication systems , 2014, IEEE Communications Magazine.
[18] D. Hunter,et al. A Tutorial on MM Algorithms , 2004 .
[19] Qi Zhang,et al. Robust Secure Beamforming in MISO Full-Duplex Two-Way Secure Communications , 2016, IEEE Transactions on Vehicular Technology.
[20] Dimitri P. Bertsekas,et al. Nonlinear Programming , 1997 .
[21] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[22] Qiang Li,et al. Spatially Selective Artificial-Noise Aided Transmit Optimization for MISO Multi-Eves Secrecy Rate Maximization , 2013, IEEE Transactions on Signal Processing.
[23] Qiang Li,et al. Sum secrecy rate maximization for full-duplex two-way relay networks , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[24] Ender Tekin,et al. The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.
[25] Zhi Chen,et al. A Full-Duplex Bob in the MIMO Gaussian Wiretap Channel: Scheme and Performance , 2016, IEEE Signal Processing Letters.
[26] Sumei Sun,et al. Full-Duplex Wireless-Powered Communication Network With Energy Causality , 2014, IEEE Transactions on Wireless Communications.
[27] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[28] Dongkyu Kim,et al. A Survey of In-Band Full-Duplex Transmission: From the Perspective of PHY and MAC Layers , 2015, IEEE Communications Surveys & Tutorials.
[29] Tho Le-Ngoc,et al. Improving Wireless Secrecy Rate via Full-Duplex Relay-Assisted Protocols , 2015, IEEE Transactions on Information Forensics and Security.
[30] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[31] Anthony Man-Cho So,et al. Physical-Layer Multicasting by Stochastic Transmit Beamforming and Alamouti Space-Time Coding , 2013, IEEE Transactions on Signal Processing.
[32] Jong-Ho Lee,et al. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems , 2015, IEEE Communications Letters.
[33] Zhi-Quan Luo,et al. A Unified Convergence Analysis of Block Successive Minimization Methods for Nonsmooth Optimization , 2012, SIAM J. Optim..
[34] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[35] Gert R. G. Lanckriet,et al. On the Convergence of the Concave-Convex Procedure , 2009, NIPS.