暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Lingfeng Shen,et al. Iterative UAV Trajectory Optimization for Physical Layer Secure Mobile Relaying , 2018, 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[3] Muhammad R. A. Khandaker,et al. Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.
[4] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[5] Jun Li,et al. UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization , 2019, IEEE Transactions on Vehicular Technology.
[6] Mathini Sellathurai,et al. UAV-Aided Jamming for Secure Ground Communication With Unknown Eavesdropper Location , 2020, IEEE Access.
[7] Ibrahim Kocaman. Distributed Beamforming in a Swarm UAV Network , 2008 .
[8] Zhiyang Li,et al. Joint Trajectory and Communication Design for Secure UAV Networks , 2019, IEEE Communications Letters.
[9] Muhammad R. A. Khandaker,et al. Interference MIMO Relay Channel: Joint Power Control and Transceiver-Relay Beamforming , 2012, IEEE Transactions on Signal Processing.
[10] Gene H. Golub,et al. Symmetric Tensors and Symmetric Tensor Rank , 2008, SIAM J. Matrix Anal. Appl..
[11] Ning Ge,et al. UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective , 2019, IEEE Access.
[12] Zhiguo Ding,et al. Secure UAV-to-UAV Systems With Spatially Random UAVs , 2019, IEEE Wireless Communications Letters.
[13] Kaare Brandt Petersen,et al. The Matrix Cookbook , 2006 .
[14] An Li,et al. Mobile jammer-aided secure UAV communications via trajectory design and power control , 2018, China Communications.
[15] Stephen P. Boyd,et al. Recent Advances in Learning and Control , 2008, Lecture Notes in Control and Information Sciences.
[16] Muhammad R. A. Khandaker,et al. SWIPT in MISO Multicasting Systems , 2014, IEEE Wireless Communications Letters.
[17] Mehdi Bennis,et al. A Speculative Study on 6G , 2019, IEEE Wireless Communications.
[18] Qingqing Wu,et al. Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.
[19] Qingqing Wu,et al. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.
[20] Symeon Chatzinotas,et al. Successive Convex Approximation Algorithms for Sparse Signal Estimation with Nonconvex Regularizations , 2018, 2018 IEEE 10th Sensor Array and Multichannel Signal Processing Workshop (SAM).
[21] Baoqing Li,et al. Joint Trajectory and Power Design for UAV-Enabled Secure Communications With No-Fly Zone Constraints , 2019, IEEE Access.
[22] Gregory H. Huff,et al. An investigation of geolocation-aware beamforming algorithms for swarming UAVs , 2017, 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting.
[23] Huiming Wang,et al. Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.
[24] Ian F. Akyildiz,et al. 6G and Beyond: The Future of Wireless Communications Systems , 2020, IEEE Access.
[25] Derrick Wing Kwan Ng,et al. Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.