Relay Cooperative Beamforming Algorithm Based on Probabilistic Constraint in SWIPT Secrecy Networks
暂无分享,去创建一个
Zhentao Hu | Dongdong Xie | Mingqi Jin | Lin Zhou | Jifang Li | Dongdong Xie | Jifang Li | Zhen-tao Hu | Lin Zhou | Mingqi Jin
[1] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[2] Feng Shu,et al. Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.
[3] Zouheir Rezki,et al. Energy Efficient Resource Allocation for Cognitive Radios: A Generalized Sensing Analysis , 2015, IEEE Transactions on Wireless Communications.
[4] Inkyu Lee,et al. Outage Constrained Robust Beamforming for Secure Broadcasting Systems With Energy Harvesting , 2016, IEEE Transactions on Wireless Communications.
[5] Rui Zhang,et al. Wireless Powered Cooperative Jamming for Secrecy Multi-AF Relaying Networks , 2015, IEEE Transactions on Wireless Communications.
[6] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.
[7] Xiaobo Zhou,et al. Robust Beamforming Design for Secure DM-Based Relay Networks With Self-Sustained Jammers , 2019, IEEE Access.
[8] Bin Li,et al. Probabilistic-constrained robust secure transmission for energy harvesting over MISO channels , 2017, Science China Information Sciences.
[9] Jeffrey G. Andrews,et al. The Guard Zone in Wireless Ad hoc Networks , 2007, IEEE Transactions on Wireless Communications.
[10] Yaming Wang,et al. Secure Beamforming for MIMO Broadcasting With Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.
[11] Yi Hong,et al. On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT , 2019, IEEE Access.
[12] S. Zionts,et al. Programming with linear fractional functionals , 1968 .
[13] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.
[14] Derrick Wing Kwan Ng,et al. Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems , 2015, IEEE Communications Letters.
[15] A. Lee Swindlehurst,et al. Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[16] Tiejun Lv,et al. Secure Wireless Information and Power Transfer in Heterogeneous Networks , 2017, IEEE Access.
[17] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[18] Anant Sahai,et al. Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.
[19] Lajos Hanzo,et al. Cooperative Secure Transmission Relying on Optimal Power Allocation in the Presence of Untrusted Relays, A Passive Eavesdropper and Hardware Impairments , 2019, IEEE Access.
[20] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[21] Phee Lep Yeoh,et al. Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens , 2020, IEEE Transactions on Communications.
[22] Chong-Yung Chi,et al. Outage Constrained Robust Transmit Optimization for Multiuser MISO Downlinks: Tractable Approximations by Conic Optimization , 2011, IEEE Transactions on Signal Processing.
[23] Zhu Han,et al. Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.
[24] Lav R. Varshney,et al. Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.
[25] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[26] H. Vincent Poor,et al. Fundamentals of Wireless Information and Power Transfer: From RF Energy Harvester Models to Signal and System Designs , 2018, IEEE Journal on Selected Areas in Communications.
[27] Yan Zhang,et al. Secure Transmission for Heterogeneous Cellular Networks With Wireless Information and Power Transfer , 2018, IEEE Systems Journal.