Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks
暂无分享,去创建一个
[1] Zhiguo Ding,et al. Harvest-and-jam: Improving security for wireless energy harvesting cooperative networks , 2014, 2014 IEEE Global Communications Conference.
[2] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[3] Nikos D. Sidiropoulos,et al. Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.
[4] Jos F. Sturm,et al. A Matlab toolbox for optimization over symmetric cones , 1999 .
[5] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[6] Victor C. M. Leung,et al. Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.
[7] Victor C. M. Leung,et al. Energy Efficient User Association and Power Allocation in Millimeter-Wave-Based Ultra Dense Networks With Energy Harvesting Base Stations , 2017, IEEE Journal on Selected Areas in Communications.
[8] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[9] J. Lofberg,et al. YALMIP : a toolbox for modeling and optimization in MATLAB , 2004, 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508).
[10] Victor C. M. Leung,et al. Resource Allocation in SWIPT Enabled Heterogeneous Cloud Small Cell Networks with Incomplete CSI , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[11] Zhu Han,et al. Wireless Networks With RF Energy Harvesting: A Contemporary Survey , 2014, IEEE Communications Surveys & Tutorials.
[12] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[13] Johan Efberg,et al. YALMIP : A toolbox for modeling and optimization in MATLAB , 2004 .
[14] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[15] Bin Zhu,et al. Rank-Two Beamformed Secure Multicasting for Wireless Information and Power Transfer , 2014, IEEE Signal Processing Letters.
[16] Yongming Huang,et al. Secure Beamforming for SWIPT in Multiuser MISO Broadcast Channel With Confidential Messages , 2015, IEEE Communications Letters.
[17] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2011, IEEE Transactions on Wireless Communications.
[18] Qi Zhang,et al. Robust Secure Transmission in MISO Simultaneous Wireless Information and Power Transfer System , 2015, IEEE Transactions on Vehicular Technology.
[19] Xiangfeng Wang,et al. Joint Power Splitting and Secure Beamforming Design in the Multiple Non-Regenerative Wireless-Powered Relay Networks , 2015, IEEE Communications Letters.
[20] Jong-Ho Lee,et al. Confidential Multicasting Assisted by Multi-Hop Multi-Antenna DF Relays in the Presence of Multiple Eavesdroppers , 2016, IEEE Transactions on Communications.
[21] Steven P. Weber,et al. On Cooperative Relaying Schemes for Wireless Physical Layer Security , 2010, IEEE Transactions on Signal Processing.
[22] Qi Zhang,et al. Secure Relay Beamforming for Simultaneous Wireless Information and Power Transfer in Nonregenerative Relay Networks , 2014, IEEE Transactions on Vehicular Technology.
[23] Derrick Wing Kwan Ng,et al. Secure layered transmission in multicast systems with wireless information and power transfer , 2013, 2014 IEEE International Conference on Communications (ICC).
[24] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[25] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.