Secure wireless energy harvesting-enabled AF-relaying SWIPT networks
暂无分享,去创建一个
[1] Athina P. Petropulu,et al. Uncoordinated Cooperative Jamming for Secret Communications , 2013, IEEE Transactions on Information Forensics and Security.
[2] Abraham Charnes,et al. Programming with linear fractional functionals , 1962 .
[3] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[4] Mustafa Cenk Gursoy,et al. Relay beamforming strategies for physical-layer security , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[5] H. Vincent Poor,et al. Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks , 2013, IEEE Transactions on Wireless Communications.
[6] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[7] Qiang Li,et al. Cooperative Secure Beamforming for AF Relay Networks With Multiple Eavesdroppers , 2013, IEEE Signal Processing Letters.
[8] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[9] Derrick Wing Kwan Ng,et al. Multi-objective beamforming for secure communication in systems with wireless information and power transfer , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[10] Kai-Kit Wong,et al. Optimal Cooperative Jamming to Enhance Physical Layer Security Using Relays , 2011, IEEE Transactions on Signal Processing.
[11] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[12] Ali A. Nasir,et al. Relaying Protocols for Wireless Energy Harvesting and Information Processing , 2012, IEEE Transactions on Wireless Communications.
[13] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .
[14] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.