Joint Source and Relay Secure Beamforming for Nonregenerative MIMO Relay Systems With Wireless Information and Power Transfer
暂无分享,去创建一个
[1] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[2] Chengwen Xing,et al. MIMO Beamforming Designs With Partial CSI Under Energy Harvesting Constraints , 2013, IEEE Signal Processing Letters.
[3] J. Dunn. Rates of convergence for conditional gradient algorithms near singular and nonsingular extremals , 1978 .
[4] Lav R. Varshney,et al. Transporting information and energy simultaneously , 2008, 2008 IEEE International Symposium on Information Theory.
[5] J. Magnus,et al. Matrix Differential Calculus with Applications in Statistics and Econometrics , 1991 .
[6] Rui Zhang,et al. MIMO Broadcasting for Simultaneous Wireless Information and Power Transfer , 2013 .
[7] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[8] Meixia Tao,et al. Robust Beamforming for Wireless Information and Power Transmission , 2012, IEEE Wireless Communications Letters.
[9] Xiangfeng Wang,et al. Joint Power Splitting and Secure Beamforming Design in the Multiple Non-Regenerative Wireless-Powered Relay Networks , 2015, IEEE Communications Letters.
[10] Wing-Kin Ma,et al. Optimum Performance Boundaries of OSTBC Based AF-MIMO Relay System With Energy Harvesting Receiver , 2013, IEEE Transactions on Signal Processing.
[11] Kai-Kit Wong,et al. To Harvest and Jam: A Paradigm of Self-Sustaining Friendly Jammers for Secure AF Relaying , 2015, IEEE Transactions on Signal Processing.
[12] Qi Zhang,et al. Beamforming in Non-Regenerative Two-Way Multi-Antenna Relay Networks for Simultaneous Wireless Information and Power Transfer , 2014, IEEE Transactions on Wireless Communications.
[13] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[14] Yue Rong,et al. Joint Source and Relay Optimization for Two-Way Linear Non-Regenerative MIMO Relay Communications , 2012, IEEE Transactions on Signal Processing.
[15] A. Lee Swindlehurst,et al. Fixed SINR solutions for the MIMO wiretap channel , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[16] R. Horst,et al. DC Programming: Overview , 1999 .
[17] Kee Chaing Chua,et al. Secrecy wireless information and power transfer with MISO beamforming , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[18] Olav Tirkkonen,et al. Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..
[19] Bin Zhu,et al. Rank-Two Beamformed Secure Multicasting for Wireless Information and Power Transfer , 2014, IEEE Signal Processing Letters.
[20] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[21] Tamás Terlaky,et al. Interior Point Methods for Nonlinear Optimization , 2010 .
[22] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[23] Zhu Han,et al. On the Resilience of Wireless Multiuser Networks to Passive and Active Eavesdroppers , 2013, IEEE Journal on Selected Areas in Communications.
[24] Amir Beck,et al. A sequential parametric convex approximation method with applications to nonconvex truss topology design problems , 2010, J. Glob. Optim..
[25] Bayan S. Sharif,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.
[26] A. Lee Swindlehurst,et al. Cooperative Jamming for Secure Communications in MIMO Relay Networks , 2011, IEEE Transactions on Signal Processing.
[27] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[28] Feng Liu,et al. Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks , 2014, IEEE Transactions on Information Forensics and Security.
[29] Anant Sahai,et al. Shannon meets Tesla: Wireless information and power transfer , 2010, 2010 IEEE International Symposium on Information Theory.
[30] Xianda Zhang,et al. Secure Relay Beamforming With Imperfect Channel Side Information , 2013, IEEE Transactions on Vehicular Technology.
[31] Stéphane Y. Le Goff,et al. Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer , 2015, IEEE Transactions on Vehicular Technology.
[32] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[33] Yimin Zhang,et al. Simultaneous transfer of energy and information for MIMO-OFDM relay system , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).
[34] Yurii Nesterov,et al. Interior-point polynomial algorithms in convex programming , 1994, Siam studies in applied mathematics.
[35] Qi Zhang,et al. Secure Relay Beamforming for SWIPT in Amplify-and-Forward Two-Way Relay Networks , 2016, IEEE Transactions on Vehicular Technology.
[36] J. Dunn. Convergence Rates for Conditional Gradient Sequences Generated by Implicit Step Length Rules , 1980 .
[37] A. Lee Swindlehurst,et al. Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[38] Eduard A. Jorswieck,et al. Secrecy Outage in MISO Systems With Partial Channel Information , 2012, IEEE Transactions on Information Forensics and Security.
[39] Wei Guan,et al. Joint MMSE Transceiver Design in Non-Regenerative MIMO Relay Systems , 2008, IEEE Communications Letters.