Robust Beamforming Design for Secrecy in Multiuser Peer-to-Peer Wireless Relay Networks
暂无分享,去创建一个
[1] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[2] Gene H. Golub,et al. Matrix computations (3rd ed.) , 1996 .
[3] Daniel Pérez Palomar,et al. A robust maximin approach for MIMO communications with imperfect channel state information based on convex optimization , 2006, IEEE Transactions on Signal Processing.
[4] Armin Wittneben,et al. Spectral efficient protocols for half-duplex fading relay channels , 2007, IEEE Journal on Selected Areas in Communications.
[5] Adeel Razi,et al. Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.
[6] Wenbo Wang,et al. Algorithms for Secrecy Guarantee With Null Space Beamforming in Two-Way Relay Networks , 2014, IEEE Transactions on Signal Processing.
[7] Derrick Wing Kwan Ng,et al. Joint Beamforming and Power Allocation for Secrecy in Peer-to-Peer Relay Networks , 2015, IEEE Transactions on Wireless Communications.
[8] Il-Min Kim,et al. Joint Secure Beamforming Design at the Source and the Relay for an Amplify-and-Forward MIMO Untrusted Relay System , 2012, IEEE Transactions on Signal Processing.
[9] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[10] Tharmalingam Ratnarajah,et al. Joint Transceiver Beamforming in MIMO Cognitive Radio Network Via Second-Order Cone Programming , 2012, IEEE Transactions on Signal Processing.
[11] John S. Thompson,et al. Relay selection for secure cooperative networks with jamming , 2009, IEEE Transactions on Wireless Communications.
[12] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[13] Huiming Wang,et al. Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.
[14] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[15] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[16] Saeed Gazor,et al. Multiple Peer-to-Peer Communications Using a Network of Relays , 2009, IEEE Transactions on Signal Processing.
[17] Timothy N. Davidson,et al. Convex Conic Formulations of Robust Downlink Precoder Designs With Quality of Service Constraints , 2007, IEEE Journal of Selected Topics in Signal Processing.
[18] Xin Wang,et al. Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.
[19] Huiming Wang,et al. Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI , 2013, IEEE Signal Processing Letters.
[20] Huiming Wang,et al. Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity Design , 2015, IEEE Transactions on Vehicular Technology.
[21] Björn E. Ottersten,et al. Robust Collaborative-Relay Beamforming , 2009, IEEE Transactions on Signal Processing.
[22] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[23] Yong Cheng,et al. Joint Optimization of Source Power Allocation and Distributed Relay Beamforming in Multiuser Peer-to-Peer Relay Networks , 2012, IEEE Transactions on Signal Processing.
[24] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[25] A. Lee Swindlehurst,et al. Full Rank Solutions for the MIMO Gaussian Wiretap Channel With an Average Power Constraint , 2012, IEEE Transactions on Signal Processing.
[26] Marius Pesavento,et al. Distributed Beamforming for Multi-Group Multicasting Relay Networks , 2012, IEEE Transactions on Signal Processing.