Secure Beamforming for Untrusted MISO Cognitive Radio Networks
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Xiangyun Zhou,et al. Secure Transmission Design for Cognitive Radio Networks With Poisson Distributed Eavesdroppers , 2016, IEEE Transactions on Information Forensics and Security.
[3] Iain B. Collings,et al. Large System Analysis of Linear Precoding in MISO Broadcast Channels with Confidential Messages , 2013, IEEE Journal on Selected Areas in Communications.
[4] Alfred O. Hero,et al. Secure space-time communication , 2003, IEEE Trans. Inf. Theory.
[5] Meixia Tao,et al. Optimal Linear Transceiver Designs for Cognitive Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Huiming Wang,et al. On the Secrecy Throughput Maximization for MISO Cognitive Radio Network in Slow Fading Channels , 2014, IEEE Transactions on Information Forensics and Security.
[8] Meng Zhang,et al. Artificial Noise Aided Secrecy Information and Power Transfer in OFDMA Systems , 2016, IEEE Transactions on Wireless Communications.
[9] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[10] Meng Zhang,et al. Joint Secure Beamforming for Cognitive Radio Networks with Untrusted Secondary Users , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[11] Shuzhong Zhang,et al. New results on Hermitian matrix rank-one decomposition , 2011, Math. Program..
[12] Xiangyun Zhou,et al. Base Station Cooperation for Confidential Broadcasting in Multi-Cell Networks , 2015, IEEE Transactions on Wireless Communications.
[13] Joonhyuk Kang,et al. Spectrum Leasing via Cooperation for Enhanced Physical-Layer Secrecy , 2011, 2011 IEEE International Conference on Communications (ICC).
[14] Yiyang Pei,et al. Secure communication over MISO cognitive radio channels , 2010, IEEE Transactions on Wireless Communications.
[15] Ying-Chang Liang,et al. Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks , 2007, IEEE Journal of Selected Topics in Signal Processing.
[16] Branka Vucetic,et al. Cooperative Spectrum Sharing in Cognitive Radio Networks With Multiple Antennas , 2011, IEEE Transactions on Signal Processing.
[17] K. J. Ray Liu,et al. An Information Secrecy Game in Cognitive Radio Networks , 2011, IEEE Transactions on Information Forensics and Security.
[18] Meng Zhang,et al. Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.
[19] Yasutada Oohama,et al. Capacity Theorems for Relay Channels with Confidential Messages , 2007, 2007 IEEE International Symposium on Information Theory.
[20] Aylin Yener,et al. Improving Secrecy Rate via Spectrum Leasing for Friendly Jamming , 2013, IEEE Transactions on Wireless Communications.
[21] Roy D. Yates,et al. Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions , 2007, IEEE Transactions on Information Theory.
[22] Jos F. Sturm,et al. A Matlab toolbox for optimization over symmetric cones , 1999 .
[23] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[24] Mengyu Liu,et al. Power Allocation for Secure SWIPT Systems With Wireless-Powered Cooperative Jamming , 2017, IEEE Communications Letters.
[25] Meixia Tao,et al. Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay , 2013, IEEE Transactions on Signal Processing.
[26] Shuzhong Zhang,et al. Quadratic maximization and semidefinite relaxation , 2000, Math. Program..
[27] Yingbo Hua,et al. Optimal Design of Non-Regenerative MIMO Wireless Relays , 2007, IEEE Transactions on Wireless Communications.
[28] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[29] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[30] Xiangyun Zhou,et al. Regularized Channel Inversion for Simultaneous Confidential Broadcasting and Power Transfer: A Large System Analysis , 2016, IEEE Journal of Selected Topics in Signal Processing.
[31] Andrea J. Goldsmith,et al. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.
[32] Ian F. Akyildiz,et al. A survey on spectrum management in cognitive radio networks , 2008, IEEE Communications Magazine.
[33] Qian Zhang,et al. Stackelberg game for utility-based cooperative cognitiveradio networks , 2009, MobiHoc '09.