-
1
-
-
45249119255
-
Secure communication over fading channels
-
Y Liang, HV Poor, S Shamai, Secure communication over fading channels. IEEE Trans. Inf. Theory. 54(6), 2470–2492 (2008).
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
2
-
-
84866730731
-
Energy efficiency of cooperative jamming strategies in secure wireless networks
-
M Dehghan, DL Goeckel, M Ghaderi, Z Ding, Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Trans. Wirel. Commun. 11(9), 3025–3029 (2012).
-
(2012)
IEEE Trans. Wirel. Commun
, vol.11
, Issue.9
, pp. 3025-3029
-
-
Dehghan, M.1
Goeckel, D.L.2
Ghaderi, M.3
Ding, Z.4
-
3
-
-
84883395356
-
Transmit solutions for MIMO wiretap channels using alternating optimization
-
Q Li, M Hong, HT Wai, YF Liu, WK Ma, ZQ Luo, Transmit solutions for MIMO wiretap channels using alternating optimization. IEEE J. Sel. Areas Commun. 31(9), 1714–1727 (2013).
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.9
, pp. 1714-1727
-
-
Li, Q.1
Hong, M.2
Wai, H.T.3
Liu, Y.F.4
Ma, W.K.5
Luo, Z.Q.6
-
4
-
-
84901606140
-
Performance of opportunistic scheduling for physical layer security with transmit antenna selection
-
AP Shrestha, KS Kwak, Performance of opportunistic scheduling for physical layer security with transmit antenna selection. EURASIP J. Wirel. Commun. Netw. 1(33), 1–9 (2014).
-
(2014)
EURASIP J. Wirel. Commun. Netw
, vol.1
, Issue.33
, pp. 1-9
-
-
Shrestha, A.P.1
Kwak, K.S.2
-
5
-
-
84921832973
-
-
Y Zou, J Zhu, X Wang, VCM Leung. Improving physical-layer security in wireless communications using diversity techniques.IEEE Netw. 29(1), 42–48 (2015).
-
(2015)
Improving physical-layer security in wireless communications using diversity techniques.IEEE Netw
, vol.29
, Issue.1
, pp. 42-48
-
-
Zou, Y.1
Zhu, J.2
Wang, X.3
Leung, V.C.M.4
-
6
-
-
84946240351
-
Robust joint beamforming and jamming for secure AF networks: low-complexity design
-
C Wang, HM Wang, Robust joint beamforming and jamming for secure AF networks: low-complexity design. IEEE Trans. Veh. Technol. 64(5), 2192–2198 (2014).
-
(2014)
IEEE Trans. Veh. Technol
, vol.64
, Issue.5
, pp. 2192-2198
-
-
Wang, C.1
Wang, H.M.2
-
7
-
-
84959309683
-
Cooperative beamforming and user selection for improving the security of relay-aided systems
-
TM Hoang, TQ Duong, HA Suraweera, C Tellambura, HV Poor, Cooperative beamforming and user selection for improving the security of relay-aided systems. IEEE Trans. Commun. 63(12), 5039–5051 (2015).
-
(2015)
IEEE Trans. Commun
, vol.63
, Issue.12
, pp. 5039-5051
-
-
Hoang, T.M.1
Duong, T.Q.2
Suraweera, H.A.3
Tellambura, C.4
Poor, H.V.5
-
8
-
-
80052913251
-
Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
-
SAA Fakoorian, AL Swindlehurst, Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Trans. Signal Process. 59(10), 5013–5022 (2011).
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 5013-5022
-
-
Fakoorian, S.A.A.1
Swindlehurst, A.L.2
-
9
-
-
80052870842
-
On cooperative relaying schemes for wireless physical layer security
-
J Li, AP Petropulu, S Weber, On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process. 59(10), 4985–4997 (2011).
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.10
, pp. 4985-4997
-
-
Li, J.1
Petropulu, A.P.2
Weber, S.3
-
10
-
-
84890887487
-
DL Goeckel, A Orda, M Dehghan, in Proceedings of 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). Efficient Wireless Security Through Jamming, Coding and Routing (New Orleans
-
M Ghaderi, DL Goeckel, A Orda, M Dehghan, in Proceedings of 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). Efficient Wireless Security Through Jamming, Coding and Routing (New Orleans, LA, 2013), pp. 505–513.
-
(2013)
LA
, pp. 505-513
-
-
-
11
-
-
84961574762
-
Minimum energy routing and jamming to thwart wireless network eavesdroppers
-
M Ghaderi, D Goeckel, A Orda, M Dehghan, Minimum energy routing and jamming to thwart wireless network eavesdroppers. IEEE Trans. Mobile Comput. 14(7), 1433–1448 (2014).
-
(2014)
IEEE Trans. Mobile Comput
, vol.14
, Issue.7
, pp. 1433-1448
-
-
Ghaderi, M.1
Goeckel, D.2
Orda, A.3
Dehghan, M.4
-
12
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
L Dong, Z Han, AP Petropulu, HV Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875–1888 (2010).
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
13
-
-
79951618084
-
Optimal cooperative jamming to enhance physical layer security using relays
-
G Zheng, LC Choo, KK Wong, Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process. 59(3), 1317–1322 (2011).
-
(2011)
IEEE Trans. Signal Process
, vol.59
, Issue.3
, pp. 1317-1322
-
-
Zheng, G.1
Choo, L.C.2
Wong, K.K.3
-
14
-
-
84883698532
-
On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
-
PH Lin, SH Lai, SC Lin, HJ Su, On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J. Sel. Areas Commun. 31(9), 1728–1740 (2013).
-
(2013)
IEEE J. Sel. Areas Commun
, vol.31
, Issue.9
, pp. 1728-1740
-
-
Lin, P.H.1
Lai, S.H.2
Lin, S.C.3
Su, H.J.4
-
15
-
-
84883395475
-
Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
-
Q Li, WK Ma, Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization. IEEE Trans. Signal Process. 61(10), 2704–2717 (2013).
-
(2013)
IEEE Trans. Signal Process
, vol.61
, Issue.10
, pp. 2704-2717
-
-
Li, Q.1
Ma, W.K.2
-
16
-
-
84929359010
-
S Le Goff, Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer
-
Z Chu, K Cumanan, Z Ding, M Johnston, S Le Goff, Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Trans. Veh. Technol. 64(5), 1833–1847 (2015).
-
(2015)
IEEE Trans. Veh. Technol
, vol.64
, Issue.5
, pp. 1833-1847
-
-
Chu, Z.1
Cumanan, K.2
Ding, Z.3
Johnston, M.4
-
17
-
-
84870554789
-
Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
-
Y Yang, Q Li, WK Ma, J Ge, PC Ching, Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Process. Lett. 20(1), 35–38 (2013).
-
(2013)
IEEE Signal Process. Lett
, vol.20
, Issue.1
, pp. 35-38
-
-
Yang, Y.1
Li, Q.2
Ma, W.K.3
Ge, J.4
Ching, P.C.5
-
18
-
-
84870499401
-
A general relaying transmission protocol for MIMO secrecy communications
-
Z Ding, M Peng, HH Chen, A general relaying transmission protocol for MIMO secrecy communications. IEEE Trans. Commun. 60(11), 3461–3471 (2012).
-
(2012)
IEEE Trans. Commun
, vol.60
, Issue.11
, pp. 3461-3471
-
-
Ding, Z.1
Peng, M.2
Chen, H.H.3
-
20
-
-
84879149313
-
Secure relay beamforming with imperfect channel state information
-
X Wang, K Wang, X Zhang, Secure relay beamforming with imperfect channel state information. IEEE Trans. Veh. Technol. 62(5), 2140–2155 (2013).
-
(2013)
IEEE Trans. Veh. Technol
, vol.62
, Issue.5
, pp. 2140-2155
-
-
Wang, X.1
Wang, K.2
Zhang, X.3
-
21
-
-
84863359764
-
Robust secure transmission in MISO channels based on worst-case optimization
-
J Huang, AL Swindlehurst, Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal Process. 60(4), 1696–1707 (2012).
-
(2012)
IEEE Trans. Signal Process
, vol.60
, Issue.4
, pp. 1696-1707
-
-
Huang, J.1
Swindlehurst, A.L.2
-
22
-
-
84937952482
-
Robust beamforming design for sum secrecy rate optimization in MU-MISO networks
-
P Zhao, M Zhang, H Yu, H Luo, W Chen, Robust beamforming design for sum secrecy rate optimization in MU-MISO networks. IEEE Trans. Inf. Forensics Secur. 10(9), 1812–1823 (2015).
-
(2015)
IEEE Trans. Inf. Forensics Secur
, vol.10
, Issue.9
, pp. 1812-1823
-
-
Zhao, P.1
Zhang, M.2
Yu, H.3
Luo, H.4
Chen, W.5
-
23
-
-
84883278751
-
K-F Tong, Robust coordinated beamforming for secure MISO interference channels with bounded ellipsoidal uncertainties
-
J Ni, Z Fei, KK Wong, C Xing, J Kuang, K-F Tong, Robust coordinated beamforming for secure MISO interference channels with bounded ellipsoidal uncertainties. IEEE Wirel. Commun. Lett. 2(4), 407–410 (2013).
-
(2013)
IEEE Wirel. Commun. Lett
, vol.2
, Issue.4
, pp. 407-410
-
-
Ni, J.1
Fei, Z.2
Wong, K.K.3
Xing, C.4
Kuang, J.5
-
24
-
-
84908072542
-
Ergodic secrecy rate of two-user MISO interference channels with statistical CSI.SCIENCE CHINA Inf
-
Z Fei, J Ni, D Zhao, C Xing, N Wang, J Kuang, Ergodic secrecy rate of two-user MISO interference channels with statistical CSI.SCIENCE CHINA Inf. Sci. 57(10), 1–14 (2014).
-
(2014)
Sci
, vol.57
, Issue.10
, pp. 1-14
-
-
Fei, Z.1
Ni, J.2
Zhao, D.3
Xing, C.4
Wang, N.5
Kuang, J.6
-
26
-
-
84884367986
-
Joint optimization in bidirectional multi-user multi-relay MIMO systems: non-robust and robust cases
-
M Zhang, H Yi, H Yu, H Luo, W Chen, Joint optimization in bidirectional multi-user multi-relay MIMO systems: non-robust and robust cases. IEEE Trans.Veh. Technol. 62(7), 3228–3244 (2013).
-
(2013)
IEEE Trans.Veh. Technol
, vol.62
, Issue.7
, pp. 3228-3244
-
-
Zhang, M.1
Yi, H.2
Yu, H.3
Luo, H.4
Chen, W.5
-
27
-
-
84907964903
-
Relaying robust beamforming for device-to-device communication with channel uncertainty
-
Y Qin, M Ding, M Zhang, H Yu, H Luo, Relaying robust beamforming for device-to-device communication with channel uncertainty. IEEE Commun.Lett. 18(10), 1859–1862 (2014).
-
(2014)
IEEE Commun.Lett
, vol.18
, Issue.10
, pp. 1859-1862
-
-
Qin, Y.1
Ding, M.2
Zhang, M.3
Yu, H.4
Luo, H.5
-
28
-
-
84933574101
-
Location-based secure transmission for wiretap channels
-
C Liu, N Yang, J Yuan, R Malaney, Location-based secure transmission for wiretap channels. IEEE J. Sel. Areas Commun. 33(7), 1458–1470 (2015).
-
(2015)
IEEE J. Sel. Areas Commun
, vol.33
, Issue.7
, pp. 1458-1470
-
-
Liu, C.1
Yang, N.2
Yuan, J.3
Malaney, R.4
-
29
-
-
79956205910
-
Maximal ratio diversity combining enhanced security
-
F He, H Man, W Wang, Maximal ratio diversity combining enhanced security. IEEE Commun. Lett. 15(5), 509–511 (2011).
-
(2011)
IEEE Commun. Lett
, vol.15
, Issue.5
, pp. 509-511
-
-
He, F.1
Man, H.2
Wang, W.3
-
31
-
-
84912101765
-
Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer
-
M Tian, X Huang, Q Zhang, J Qin, Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett. 22(6), 723–727 (2015).
-
(2015)
IEEE Signal Process. Lett
, vol.22
, Issue.6
, pp. 723-727
-
-
Tian, M.1
Huang, X.2
Zhang, Q.3
Qin, J.4
-
32
-
-
9944244703
-
Multivariate nonnegative quadratic mappings.SIAM
-
ZQ Luo, JF Sturm, S Zhang, Multivariate nonnegative quadratic mappings.SIAM. J. Optim. 14(4), 1140–1162 (2004).
-
(2004)
J. Optim
, vol.14
, Issue.4
, pp. 1140-1162
-
-
Luo, Z.Q.1
Sturm, J.F.2
Zhang, S.3
-
33
-
-
84921407537
-
Robust secure transmission in MISO simultaneous wireless information and power transfer system
-
R Feng, Q Li, Q Zhang, J Qin, Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans. Veh. Technol. 60(1), 400–405 (2015).
-
(2015)
IEEE Trans. Veh. Technol
, vol.60
, Issue.1
, pp. 400-405
-
-
Feng, R.1
Li, Q.2
Zhang, Q.3
Qin, J.4
-
34
-
-
33847613047
-
Strong duality in nonconvex quadratic optimization with two quadratic constraints.SIAM
-
A Beck, YC Eldar, Strong duality in nonconvex quadratic optimization with two quadratic constraints.SIAM. J. Optim. 17(3), 844–860 (2006).
-
(2006)
J. Optim
, vol.17
, Issue.3
, pp. 844-860
-
-
Beck, A.1
Eldar, Y.C.2
-
36
-
-
85026923850
-
-
I Polik, T Terlaky, in Nonlinear Optimization, ed. by G Di Pillo, F Schoen, and 1. Interior Point Methods for Nonlinear Optimization (SpringerBerlin, 2010). ch.4.
-
I Polik, T Terlaky, in Nonlinear Optimization, ed. by G Di Pillo, F Schoen, and 1. Interior Point Methods for Nonlinear Optimization (SpringerBerlin, 2010). ch.4.
-
-
-
|