메뉴 건너뛰기




Volumn 19, Issue 2, 2017, Pages 1027-1053

A Survey on Multiple-Antenna Techniques for Physical Layer Security

Author keywords

beamforming design; multiple antenna technique; Physical layer security; secrecy performance

Indexed keywords

BEAMFORMING; CRYPTOGRAPHY; DEGREES OF FREEDOM (MECHANICS); HETEROGENEOUS NETWORKS; NETWORK LAYERS; SIGNAL RECEIVERS; SURVEYS;

EID: 85020456786     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/COMST.2016.2633387     Document Type: Review
Times cited : (470)

References (268)
  • 2
    • 0024012644 scopus 로고
    • An introduction to contemporary cryptology
    • May
    • J. L. Massey, "An introduction to contemporary cryptology," Proc. IEEE, vol. 76, no. 5, pp. 533-549, May 1988.
    • (1988) Proc. IEEE , vol.76 , Issue.5 , pp. 533-549
    • Massey, J.L.1
  • 3
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 4
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 5
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 6
    • 84933048120 scopus 로고    scopus 로고
    • The challenges facing physical layer security
    • Jun.
    • W. Trappe, "The challenges facing physical layer security," IEEE Commun. Mag., vol. 53, no. 6, pp. 16-20, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 16-20
    • Trappe, W.1
  • 7
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • Oct.
    • H. Mahdavifar and A. Vardy, "Achieving the secrecy capacity of wiretap channels using polar codes," IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6428-6443, Oct. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 9
    • 84923287820 scopus 로고    scopus 로고
    • On the secrecy capacity of block fading channels with a hybrid adversary
    • Mar.
    • Y. O. Basciftci, O. Gungor, C. E. Koksal, and F. Ozguner, "On the secrecy capacity of block fading channels with a hybrid adversary," IEEE Trans. Inf. Theory, vol. 61, no. 3, pp. 1325-1343, Mar. 2015.
    • (2015) IEEE Trans. Inf. Theory , vol.61 , Issue.3 , pp. 1325-1343
    • Basciftci, Y.O.1    Gungor, O.2    Koksal, C.E.3    Ozguner, F.4
  • 10
    • 84903209092 scopus 로고    scopus 로고
    • On the physical layer security of backscatter wireless systems
    • Jun.
    • W. Saad, X. Zhou, Z. Han, and H. V. Poor, "On the physical layer security of backscatter wireless systems," IEEE Trans. Wireless Commun., vol. 13, no. 6, pp. 3442-3451, Jun. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.6 , pp. 3442-3451
    • Saad, W.1    Zhou, X.2    Han, Z.3    Poor, H.V.4
  • 11
    • 39049144353 scopus 로고    scopus 로고
    • Secrecy capacity of wireless channels
    • Seattle, WA, USA, Jul.
    • J. Barros and M. R. D. Rodrigues, "Secrecy capacity of wireless channels," in Proc. IEEE ISIT, Seattle, WA, USA, Jul. 2006, pp. 356-360.
    • (2006) Proc. IEEE ISIT , pp. 356-360
    • Barros, J.1    Rodrigues, M.R.D.2
  • 12
    • 79952822109 scopus 로고    scopus 로고
    • Bounds on secrecy capacity over correlated ergodic fading channels at high SNR
    • Apr.
    • H. Jeon, N. Kim, J. Choi, H. Lee, and J. Ha, "Bounds on secrecy capacity over correlated ergodic fading channels at high SNR," IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 1975-1983, Apr. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.4 , pp. 1975-1983
    • Jeon, H.1    Kim, N.2    Choi, J.3    Lee, H.4    Ha, J.5
  • 13
    • 77951561698 scopus 로고    scopus 로고
    • Optimum power allocation against information leakage in wireless network
    • Honolulu, HI, USA, Dec.
    • S. Bashar and Z. Ding, "Optimum power allocation against information leakage in wireless network," in Proc. IEEE GLOBECOM, Honolulu, HI, USA, Dec. 2009, pp. 1-6.
    • (2009) Proc. IEEE GLOBECOM , pp. 1-6
    • Bashar, S.1    Ding, Z.2
  • 14
    • 80051775150 scopus 로고    scopus 로고
    • Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks
    • Sep.
    • X. Wang, M. Tao, J. Mo, and Y. Xu, "Power and subcarrier allocation for physical-layer security in OFDMA-based broadband wireless networks," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 693-702, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 693-702
    • Wang, X.1    Tao, M.2    Mo, J.3    Xu, Y.4
  • 15
    • 84907003935 scopus 로고    scopus 로고
    • On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI
    • Sydney, NSW, Australia, Jun.
    • X. Chen, L. Lei, H. Zhang, and C. Yuen, "On the secrecy outage capacity of physical layer security in large-scale MIMO relaying systems with imperfect CSI," in Proc. IEEE ICC, Sydney, NSW, Australia, Jun. 2014, pp. 2052-2057.
    • (2014) Proc. IEEE ICC , pp. 2052-2057
    • Chen, X.1    Lei, L.2    Zhang, H.3    Yuen, C.4
  • 16
    • 84871984718 scopus 로고    scopus 로고
    • Cooperative jamming for secrecy in decentralized wireless networks
    • Ottawa, ON, Canada, Jun.
    • X. Zhou, M. Tao, and R. A. Kennedy, "Cooperative jamming for secrecy in decentralized wireless networks," in Proc. IEEE ICC, Ottawa, ON, Canada, Jun. 2012, pp. 2339-2344.
    • (2012) Proc. IEEE ICC , pp. 2339-2344
    • Zhou, X.1    Tao, M.2    Kennedy, R.A.3
  • 17
    • 84888875254 scopus 로고    scopus 로고
    • Security enhancement in cooperative jamming using compromised secrecy region minimization
    • Toronto, ON, Canada, Jun.
    • H. Li, X. Wang, and W. Hou, "Security enhancement in cooperative jamming using compromised secrecy region minimization," in Proc. CWIT, Toronto, ON, Canada, Jun. 2013, pp. 214-218.
    • (2013) Proc. CWIT , pp. 214-218
    • Li, H.1    Wang, X.2    Hou, W.3
  • 18
    • 85032751776 scopus 로고    scopus 로고
    • Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches
    • Sep.
    • Y.-W. P. Hong, P.-C. Lan, and C.-C. J. Kuo, "Enhancing physicallayer secrecy in multiantenna wireless systems: An overview of signal processing approaches," IEEE Signal Process. Mag., vol. 30, no. 5, pp. 29-40, Sep. 2013.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 29-40
    • Hong, Y.-W.P.1    Lan, P.-C.2    Kuo, C.-C.J.3
  • 19
    • 69449086815 scopus 로고    scopus 로고
    • Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel
    • Sep.
    • S. Shafiee, N. Liu, and S. Ulukus, "Towards the secrecy capacity of the Gaussian MIMO wire-tap channel: The 2-2-1 channel," IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4033-4039, Sep. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.9 , pp. 4033-4039
    • Shafiee, S.1    Liu, N.2    Ulukus, S.3
  • 20
    • 79960996804 scopus 로고    scopus 로고
    • The secrecy capacity of the MIMO wiretap channel
    • Aug.
    • F. Oggier and B. Hassibi, "The secrecy capacity of the MIMO wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 8, pp. 4961-4972, Aug. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.8 , pp. 4961-4972
    • Oggier, F.1    Hassibi, B.2
  • 21
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multipleantenna wiretap channel
    • Jun.
    • T. Liu and S. Shamai, "A note on the secrecy capacity of the multipleantenna wiretap channel," IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547-2553, Jun. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai, S.2
  • 24
    • 80051619768 scopus 로고    scopus 로고
    • Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI
    • Prague, Czech Republic, May
    • J. Huang and A. L. Swindlehurst, "Cooperation strategies for secrecy in MIMO relay networks with unknown eavesdropper CSI," in Proc. IEEE ICASSP, Prague, Czech Republic, May 2011, pp. 3424-3427.
    • (2011) Proc. IEEE ICASSP , pp. 3424-3427
    • Huang, J.1    Swindlehurst, A.L.2
  • 25
    • 84922569391 scopus 로고    scopus 로고
    • Energy-efficient power allocation for secure communications in large-scale MIMO relaying systems
    • Shanghai, China, Oct.
    • J. Chen, X. Chen, T. Liu, and L. Lei, "Energy-efficient power allocation for secure communications in large-scale MIMO relaying systems," in Proc. IEEE ICCC, Shanghai, China, Oct. 2014, pp. 385-390.
    • (2014) Proc. IEEE ICCC , pp. 385-390
    • Chen, J.1    Chen, X.2    Liu, T.3    Lei, L.4
  • 26
    • 72349099904 scopus 로고    scopus 로고
    • Cooperative jamming for wireless physical layer security
    • Aug./Sep.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Cooperative jamming for wireless physical layer security," in Proc. IEEE SSP, Aug./Sep. 2009, pp. 417-420.
    • (2009) Proc. IEEE SSP , pp. 417-420
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 27
    • 84880157215 scopus 로고    scopus 로고
    • Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdropper
    • Jun.
    • J. Yang, I.-M. Kim, and D. I. Kim, "Optimal cooperative jamming for multiuser broadcast channel with multiple eavesdropper," IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2840-2852, Jun. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.6 , pp. 2840-2852
    • Yang, J.1    Kim, I.-M.2    Kim, D.I.3
  • 28
    • 84890121948 scopus 로고    scopus 로고
    • Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback
    • Oct.
    • X. Chen and R. Yin, "Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback," IEEE Wireless Commun. Lett., vol. 2, no. 5, pp. 503-506, Oct. 2013.
    • (2013) IEEE Wireless Commun. Lett. , vol.2 , Issue.5 , pp. 503-506
    • Chen, X.1    Yin, R.2
  • 29
    • 84888354468 scopus 로고    scopus 로고
    • Rate regions for multiple access channel with conference and secrecy constraints
    • Dec.
    • P. Xu, Z. Ding, and X. Dai, "Rate regions for multiple access channel with conference and secrecy constraints," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1961-1974, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 1961-1974
    • Xu, P.1    Ding, Z.2    Dai, X.3
  • 30
    • 84933037312 scopus 로고    scopus 로고
    • Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks
    • Jun.
    • D. Kapetanovic, G. Zheng, and F. Rusek, "Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks," IEEE Commun. Mag., vol. 53, no. 6, pp. 21-27, Jun. 2015
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 21-27
    • Kapetanovic, D.1    Zheng, G.2    Rusek, F.3
  • 31
    • 84969988437 scopus 로고    scopus 로고
    • Resource allocation for a massive MIMO relay aided secure communication
    • Aug.
    • J. Chen, X. Chen, W. H. Gerstacker, and D. W. K. Ng, "Resource allocation for a massive MIMO relay aided secure communication," IEEE Trans. Inf. Forensics Security, vol. 11, no. 8, pp. 1700-1711, Aug. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.8 , pp. 1700-1711
    • Chen, J.1    Chen, X.2    Gerstacker, W.H.3    Ng, D.W.K.4
  • 32
    • 84883296165 scopus 로고    scopus 로고
    • Antenna subset modulation for secure millimeter-wave wireless communication
    • Aug.
    • N. Valliappan, A. Lozano, and R. W. Heath, Jr., "Antenna subset modulation for secure millimeter-wave wireless communication," IEEE Trans. Commun., vol. 61, no. 8, pp. 3231-3245, Aug. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.8 , pp. 3231-3245
    • Valliappan, N.1    Lozano, A.2    Heath, R.W.3
  • 33
    • 84855424848 scopus 로고    scopus 로고
    • Dual-beam directional modulation technique for physical-layer secure communication
    • T. Hong, M.-Z. Song, and Y. Liu, "Dual-beam directional modulation technique for physical-layer secure communication," IEEE Antennas Wireless Propag. Lett., vol. 10, pp. 1417-1420, 2011.
    • (2011) IEEE Antennas Wireless Propag. Lett. , vol.10 , pp. 1417-1420
    • Hong, T.1    Song, M.-Z.2    Liu, Y.3
  • 34
    • 84947766084 scopus 로고    scopus 로고
    • On directional modulation: An analysis of transmission scheme with multiple direction
    • London, U.K., Jun.
    • M. Hafez and H. Arslan, "On directional modulation: An analysis of transmission scheme with multiple direction," in Proc. IEEE ICCW, London, U.K., Jun. 2015, pp. 459-463.
    • (2015) Proc. IEEE ICCW , pp. 459-463
    • Hafez, M.1    Arslan, H.2
  • 35
    • 84964553490 scopus 로고    scopus 로고
    • Secure multi-user transmission using CoMP directional modulation
    • Boston, MA, USA, Sep.
    • M. Yusuf and H. Arslan, "Secure multi-user transmission using CoMP directional modulation," in Proc. IEEE VTC Fall, Boston, MA, USA, Sep. 2015, pp. 1-2.
    • (2015) Proc. IEEE VTC Fall , pp. 1-2
    • Yusuf, M.1    Arslan, H.2
  • 36
    • 80051966419 scopus 로고    scopus 로고
    • On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint
    • Kyoto, Japan, Jun.
    • Z. Rezki and M.-S. Alouini, "On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint," in Proc. IEEE ICC, Kyoto, Japan, Jun. 2011, pp. 1-5.
    • (2011) Proc. IEEE ICC , pp. 1-5
    • Rezki, Z.1    Alouini, M.-S.2
  • 37
    • 84893242895 scopus 로고    scopus 로고
    • Linear MMSE transceiver optimization for general MIMO wiretap channels with QoS constraints
    • Xi'an, China, Aug.
    • M. Pei, L. Wang, and D. Ma, "Linear MMSE transceiver optimization for general MIMO wiretap channels with QoS constraints," in Proc. IEEE/CIC ICCC, Xi'an, China, Aug. 2013, pp. 259-263.
    • (2013) Proc. IEEE/CIC ICCC , pp. 259-263
    • Pei, M.1    Wang, L.2    Ma, D.3
  • 38
    • 51649117832 scopus 로고    scopus 로고
    • On the Gaussian MIMO wiretap channel
    • Nice, France, Jun.
    • A. Khisti, G. Wornell, A. Wiesel, and Y. Eldar, "On the Gaussian MIMO wiretap channel," in Proc. IEEE ISIT, Nice, France, Jun. 2007, pp. 2471-2475.
    • (2007) Proc. IEEE ISIT , pp. 2471-2475
    • Khisti, A.1    Wornell, G.2    Wiesel, A.3    Eldar, Y.4
  • 39
    • 84947706998 scopus 로고    scopus 로고
    • Tomlinson-Harashima precoding design in MIMO wiretap channels based on the MMSE criterion
    • London U.K., Jun.
    • L. Zhang, Y. Cai, B. Champagne, and M. Zhao, "Tomlinson-Harashima precoding design in MIMO wiretap channels based on the MMSE criterion," in Proc. IEEE ICCW, London U.K., Jun. 2015, pp. 470-474.
    • (2015) Proc. IEEE ICCW , pp. 470-474
    • Zhang, L.1    Cai, Y.2    Champagne, B.3    Zhao, M.4
  • 40
    • 77955683763 scopus 로고    scopus 로고
    • MIMO Gaussian broadcast channels with confidential and common messages
    • Austin, TX, USA, Jun.
    • R. Liu, T. Liu, H. V. Poor, and S. Shamai, "MIMO Gaussian broadcast channels with confidential and common messages," in Proc. IEEE ISIT, Austin, TX, USA, Jun. 2010, pp. 2578-2582.
    • (2010) Proc. IEEE ISIT , pp. 2578-2582
    • Liu, R.1    Liu, T.2    Poor, H.V.3    Shamai, S.4
  • 41
    • 84555190397 scopus 로고    scopus 로고
    • Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system
    • Jan.
    • C. Jeong, I.-M. Kim, and D. I. Kim, "Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system," IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.1 , pp. 310-325
    • Jeong, C.1    Kim, I.-M.2    Kim, D.I.3
  • 42
    • 84864360496 scopus 로고    scopus 로고
    • On optimal artificialnoise assisted secure beamforming for the multiple-input multipleoutput fading eavesdropper channel
    • Paris, France, Apr.
    • S.-H. Lai, P.-H. Lin, S.-C. Lin, and H.-J. Su, "On optimal artificialnoise assisted secure beamforming for the multiple-input multipleoutput fading eavesdropper channel," in Proc. IEEE WCNC, Paris, France, Apr. 2012, pp. 513-517.
    • (2012) Proc. IEEE WCNC , pp. 513-517
    • Lai, S.-H.1    Lin, P.-H.2    Lin, S.-C.3    Su, H.-J.4
  • 43
    • 84881572098 scopus 로고    scopus 로고
    • Secure beamforming for MIMO two-way transmission with an untrusted relay
    • Shanghai, China, Apr.
    • J. Mo, M. Tao, Y. Liu, B. Xia, and X. Ma, "Secure beamforming for MIMO two-way transmission with an untrusted relay," in Proc. IEEE WCNC, Shanghai, China, Apr. 2013, pp. 4180-4185.
    • (2013) Proc. IEEE WCNC , pp. 4180-4185
    • Mo, J.1    Tao, M.2    Liu, Y.3    Xia, B.4    Ma, X.5
  • 44
    • 84870554789 scopus 로고    scopus 로고
    • Cooperative secure beamforming for AF relay networks with multiple eavesdroppers
    • Jan.
    • Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdroppers," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 35-38
    • Yang, Y.1    Li, Q.2    Ma, W.-K.3    Ge, J.4    Ching, P.C.5
  • 45
    • 79551619462 scopus 로고    scopus 로고
    • Secure communications via cooperative jamming in two-hop relay systems
    • Miami, FL, USA, Dec.
    • J. Huang and A. L. Swindlehurst, "Secure communications via cooperative jamming in two-hop relay systems," in Proc. IEEE GLOBECOM, Miami, FL, USA, Dec. 2010, pp. 1-5.
    • (2010) Proc. IEEE GLOBECOM , pp. 1-5
    • Huang, J.1    Swindlehurst, A.L.2
  • 46
    • 13444305231 scopus 로고    scopus 로고
    • On the capacity of MIMO broadcast channels with partial side information
    • Feb.
    • M. Sharif and B. Hassibi, "On the capacity of MIMO broadcast channels with partial side information," IEEE Trans. Inf. Theory, vol. 51, no. 2, pp. 506-522, Feb. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.2 , pp. 506-522
    • Sharif, M.1    Hassibi, B.2
  • 47
    • 77951525553 scopus 로고    scopus 로고
    • On distributed antenna systems with limited feedback precoding: Opportunities and challenges
    • Apr.
    • X. Chen, Z. Zhang, and H.-H. Chen, "On distributed antenna systems with limited feedback precoding: Opportunities and challenges," IEEE Wireless Commun., vol. 17, no. 2, pp. 80-88, Apr. 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.2 , pp. 80-88
    • Chen, X.1    Zhang, Z.2    Chen, H.-H.3
  • 48
    • 84924410728 scopus 로고    scopus 로고
    • Wireless physical layer security with imperfect channel state information: A survey
    • Sep.
    • B. He, X. Zhou, and T. D. Abhayapala, "Wireless physical layer security with imperfect channel state information: A survey," ZTE Commun., vol. 11, no. 3, pp. 11-19, Sep. 2013.
    • (2013) ZTE Commun. , vol.11 , Issue.3 , pp. 11-19
    • He, B.1    Zhou, X.2    Abhayapala, T.D.3
  • 49
    • 79955465834 scopus 로고    scopus 로고
    • On ergodic secrecy rate for Gaussian MISO wiretap channels
    • Apr.
    • J. Li and A. P. Petropulu, "On ergodic secrecy rate for Gaussian MISO wiretap channels," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1176-1187, Apr. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.4 , pp. 1176-1187
    • Li, J.1    Petropulu, A.P.2
  • 50
    • 80051720840 scopus 로고    scopus 로고
    • Ergodic secrecy rate for multiple-antenna wiretap channels with Rician fading
    • Sep.
    • J. Li and A. P. Petropulu, "Ergodic secrecy rate for multiple-antenna wiretap channels with Rician fading," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 861-867, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 861-867
    • Li, J.1    Petropulu, A.P.2
  • 51
    • 84933041310 scopus 로고    scopus 로고
    • Practical transmission scheme with fixed communication rate under constraints of transmit power and secrecy outage probability
    • Jun.
    • Z. Li, P. Mu, B. Wang, and X. Hu, "Practical transmission scheme with fixed communication rate under constraints of transmit power and secrecy outage probability," IEEE Commun. Lett., vol. 19, no. 6, pp. 1057-1060, Jun. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.6 , pp. 1057-1060
    • Li, Z.1    Mu, P.2    Wang, B.3    Hu, X.4
  • 52
    • 80051744719 scopus 로고    scopus 로고
    • On wireless channels with Mantenna eavesdroppers: Characterization of the outage probability and ϵ-outage secrecy capacity
    • Sep.
    • V. U. Prabhu and M. R. D. Rodrigues, "On wireless channels with Mantenna eavesdroppers: Characterization of the outage probability and ϵ-outage secrecy capacity," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 853-860, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 853-860
    • Prabhu, V.U.1    Rodrigues, M.R.D.2
  • 53
    • 84891356286 scopus 로고    scopus 로고
    • Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack
    • Budapest, Hungary, Jun.
    • Y. Zou, X. Wang, and W. Shen, "Intercept probability analysis of cooperative wireless networks with best relay selection in the presence of eavesdropping attack," in Proc. IEEE ICC, Budapest, Hungary, Jun. 2013, pp. 2183-2187.
    • (2013) Proc. IEEE ICC , pp. 2183-2187
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 54
    • 84921832973 scopus 로고    scopus 로고
    • Improving physicallayer security in wireless communications using diversity techniques
    • Jan./Feb.
    • Y. Zou, J. Zhu, X. Wang, and V. C. M. Leung, "Improving physicallayer security in wireless communications using diversity techniques," IEEE Netw., vol. 29, no. 1, pp. 42-48, Jan./Feb. 2015.
    • (2015) IEEE Netw. , vol.29 , Issue.1 , pp. 42-48
    • Zou, Y.1    Zhu, J.2    Wang, X.3    Leung, V.C.M.4
  • 55
    • 84877684169 scopus 로고    scopus 로고
    • Secrecy diversity in MISOME wiretap channel
    • Anaheim, CA, USA, Dec.
    • T. V. Nguyen, T. Q. S. Quek, Y. H. Kim, and H. Shin, "Secrecy diversity in MISOME wiretap channel," in Proc. IEEE GLOBECOM, Anaheim, CA, USA, Dec. 2012, pp. 4840-4845.
    • (2012) Proc. IEEE GLOBECOM , pp. 4840-4845
    • Nguyen, T.V.1    Quek, T.Q.S.2    Kim, Y.H.3    Shin, H.4
  • 56
    • 84919667792 scopus 로고    scopus 로고
    • Secrecy outage and diversity analysis of cognitive radio systems
    • Nov.
    • Y. Zou, X. Li, and Y.-C. Liang, "Secrecy outage and diversity analysis of cognitive radio systems," IEEE J. Sel. Areas Commun., vol. 32, no. 11, pp. 2222-2236, Nov. 2014.
    • (2014) IEEE J. Sel. Areas Commun. , vol.32 , Issue.11 , pp. 2222-2236
    • Zou, Y.1    Li, X.2    Liang, Y.-C.3
  • 57
    • 84880521772 scopus 로고    scopus 로고
    • MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom
    • Aug.
    • X. He, A. Khisti, and A. Yener, "MIMO multiple access channel with an arbitrarily varying eavesdropper: Secrecy degrees of freedom," IEEE Trans. Inf. Theory, vol. 59, no. 8, pp. 4733-4745, Aug. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.8 , pp. 4733-4745
    • He, X.1    Khisti, A.2    Yener, A.3
  • 58
    • 80051774469 scopus 로고    scopus 로고
    • On the secrecy degrees of freedom of the multiantenna block fading wiretap channels
    • Sep.
    • M. Kobayashi, P. Piantanida, S. Yang, and S. Shamai, "On the secrecy degrees of freedom of the multiantenna block fading wiretap channels," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 703-711, Sep. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.3 , pp. 703-711
    • Kobayashi, M.1    Piantanida, P.2    Yang, S.3    Shamai, S.4
  • 59
    • 84953725257 scopus 로고    scopus 로고
    • Optimal power allocation for secure communications in large-scale MIMO relaying systems
    • London U.K., Jun.
    • J. Chen, X. Chen, X. Wang, and L. Lei, "Optimal power allocation for secure communications in large-scale MIMO relaying systems," in Proc. IEEE ICC, London U.K., Jun. 2015, pp. 1801-1806.
    • (2015) Proc. IEEE ICC , pp. 1801-1806
    • Chen, J.1    Chen, X.2    Wang, X.3    Lei, L.4
  • 60
    • 84877718412 scopus 로고    scopus 로고
    • Secure communication via an untrusted non-regenerative relay in fading channels
    • May
    • J. Huang, A. Mukherjee, and A. L. Swindlehurst, "Secure communication via an untrusted non-regenerative relay in fading channels," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2536-2550, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2536-2550
    • Huang, J.1    Mukherjee, A.2    Swindlehurst, A.L.3
  • 61
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical layer security in multiuser wireless networks: A survey
    • 3rd Quart.
    • A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, 3rd Quart., 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.A.A.2    Huang, J.3    Swindlehurst, A.L.4
  • 64
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct.
    • P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    Gamal, H.E.3
  • 65
    • 77953802876 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas I: The MISOME wiretap channel
    • Jul.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas I: The MISOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 7, pp. 3088-3104, Jul. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.7 , pp. 3088-3104
    • Khisti, A.1    Wornell, G.W.2
  • 66
    • 77958560746 scopus 로고    scopus 로고
    • Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel
    • Nov.
    • A. Khisti and G. W. Wornell, "Secure transmission with multiple antennas-Part II: The MIMOME wiretap channel," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5515-5532, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5515-5532
    • Khisti, A.1    Wornell, G.W.2
  • 67
    • 84877752784 scopus 로고    scopus 로고
    • Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint
    • May
    • S. A. A. Fakoorian and A. L. Swindlehurst, "Full rank solutions for the MIMO Gaussian wiretap channel with an average power constraint," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2620-2631, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2620-2631
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 68
    • 84883395356 scopus 로고    scopus 로고
    • Transmit solutions for MIMO wiretap channels using alternating optimization
    • Sep.
    • Q. Li et al., "Transmit solutions for MIMO wiretap channels using alternating optimization," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1714-1727, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1714-1727
    • Li, Q.1
  • 69
    • 84903554995 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper
    • May
    • K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, "Secrecy rate optimizations for a MIMO secrecy channel with a multipleantenna eavesdropper," IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678-1690, May 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.4 , pp. 1678-1690
    • Cumanan, K.1    Ding, Z.2    Sharif, B.3    Tian, G.Y.4    Leung, K.K.5
  • 70
    • 84863908572 scopus 로고    scopus 로고
    • Linear precoding for finite-alphabet signaling over MIMOME wiretap channels
    • Jul.
    • Y. Wu, C. Xiao, Z. Ding, X. Gao, and S. Jin, "Linear precoding for finite-alphabet signaling over MIMOME wiretap channels," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2599-2612, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2599-2612
    • Wu, Y.1    Xiao, C.2    Ding, Z.3    Gao, X.4    Jin, S.5
  • 71
    • 84880560795 scopus 로고    scopus 로고
    • Filter design with secrecy constraints: The MIMO Gaussian wiretap channel
    • Aug.
    • H. Reboredo, J. Xavier, and M. R. D. Rodrigues, "Filter design with secrecy constraints: The MIMO Gaussian wiretap channel," IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3799-3814, Aug. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.15 , pp. 3799-3814
    • Reboredo, H.1    Xavier, J.2    Rodrigues, M.R.D.3
  • 72
    • 84907205584 scopus 로고    scopus 로고
    • Energy-efficient precoder design for MIMO wiretap channels
    • Sep.
    • H. Zhang, Y. Huang, S. Li, and L. Yang, "Energy-efficient precoder design for MIMO wiretap channels," IEEE Commun. Lett., vol. 18, no. 9, pp. 1559-1562, Sep. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.9 , pp. 1559-1562
    • Zhang, H.1    Huang, Y.2    Li, S.3    Yang, L.4
  • 73
    • 84860014980 scopus 로고    scopus 로고
    • Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR
    • Apr.
    • Z. Rezki and M.-S. Alouini, "Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR," IEEE Trans. Commun., vol. 60, no. 4, pp. 1138-1147, Apr. 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.4 , pp. 1138-1147
    • Rezki, Z.1    Alouini, M.-S.2
  • 74
    • 54249161889 scopus 로고    scopus 로고
    • An overview of limited feedback in wireless communication systems
    • Oct.
    • D. J. Love et al., "An overview of limited feedback in wireless communication systems," IEEE J. Sel. Areas Commun., vol. 26, no. 8, pp. 1341-1365, Oct. 2008.
    • (2008) IEEE J. Sel. Areas Commun. , vol.26 , Issue.8 , pp. 1341-1365
    • Love, D.J.1
  • 75
    • 84862266995 scopus 로고    scopus 로고
    • Finite-signal-to-noise ratio diversitymultiplexing-rate trade-off in limited feedback beamforming systems with imperfect channel state information
    • May
    • X. Chen, Z. Zhang, and S. Chen, "Finite-signal-to-noise ratio diversitymultiplexing-rate trade-off in limited feedback beamforming systems with imperfect channel state information," IET Commun., vol. 6, no. 7, pp. 751-758, May 2012.
    • (2012) IET Commun. , vol.6 , Issue.7 , pp. 751-758
    • Chen, X.1    Zhang, Z.2    Chen, S.3
  • 76
    • 33646022204 scopus 로고    scopus 로고
    • Design and analysis of transmitbeamforming based on limited-rate feedback
    • May
    • P. Xia and G. B. Giannakis, "Design and analysis of transmitbeamforming based on limited-rate feedback," IEEE Trans. Signal Process., vol. 54, no. 5, pp. 1853-1863, May 2006.
    • (2006) IEEE Trans. Signal Process. , vol.54 , Issue.5 , pp. 1853-1863
    • Xia, P.1    Giannakis, G.B.2
  • 77
    • 33645318181 scopus 로고    scopus 로고
    • Fast transfer of channel state information in wireless systems
    • Apr.
    • T. L. Marzetta and B. M. Hochwald, "Fast transfer of channel state information in wireless systems," IEEE Trans. Signal Process., vol. 54, no. 4, pp. 1268-1278, Apr. 2006.
    • (2006) IEEE Trans. Signal Process. , vol.54 , Issue.4 , pp. 1268-1278
    • Marzetta, T.L.1    Hochwald, B.M.2
  • 78
    • 80052071600 scopus 로고    scopus 로고
    • Training and feedback optimization for multiuser MIMO downlink
    • Aug.
    • M. Kobayashi, N. Jindal, and G. Caire, "Training and feedback optimization for multiuser MIMO downlink," IEEE Trans. Commun., vol. 59, no. 8, pp. 2228-2240, Aug. 2011.
    • (2011) IEEE Trans. Commun. , vol.59 , Issue.8 , pp. 2228-2240
    • Kobayashi, M.1    Jindal, N.2    Caire, G.3
  • 79
    • 77955288031 scopus 로고    scopus 로고
    • How much feedback is required for TDD multi-antenna broadcast channels with user selection?
    • U. Salim and D. Slock, "How much feedback is required for TDD multi-antenna broadcast channels with user selection?" EURASIP J. Adv. Signal Process., vol. 2010, pp. 1-14, 2010.
    • (2010) EURASIP J. Adv. Signal Process. , vol.2010 , pp. 1-14
    • Salim, U.1    Slock, D.2
  • 80
    • 77954592247 scopus 로고    scopus 로고
    • Secure communications with insecure feedback: Breaking the high-SNR ceiling
    • Aug.
    • T. T. Kim and H. V. Poor, "Secure communications with insecure feedback: Breaking the high-SNR ceiling," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3700-3711, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3700-3711
    • Kim, T.T.1    Poor, H.V.2
  • 81
    • 84923886792 scopus 로고    scopus 로고
    • Robust outage secrecy rate optimizations for a MIMO secrecy channel
    • Feb.
    • Z. Chu, K. Cumanan, Z. Ding, M. Johnston, and S. L. Goff, "Robust outage secrecy rate optimizations for a MIMO secrecy channel," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 86-89, Feb. 2015.
    • (2015) IEEE Wireless Commun. Lett. , vol.4 , Issue.1 , pp. 86-89
    • Chu, Z.1    Cumanan, K.2    Ding, Z.3    Johnston, M.4    Goff, S.L.5
  • 82
    • 79960433598 scopus 로고    scopus 로고
    • Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming
    • Aug.
    • Q. Li and W.-K. Ma, "Optimal and robust transmit designs for MISO channel secrecy by semidefinite programming," IEEE Trans. Signal Process., vol. 59, no. 8, pp. 3799-3812, Aug. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.8 , pp. 3799-3812
    • Li, Q.1    Ma, W.-K.2
  • 83
    • 79955484022 scopus 로고    scopus 로고
    • On secrecy of codebook-based transmission beamforming under receiver limited feedback
    • Apr.
    • S. Bashar, Z. Ding, and G. Y. Li, "On secrecy of codebook-based transmission beamforming under receiver limited feedback," IEEE Trans. Wireless Commun., vol. 10, no. 4, pp. 1212-1223, Apr. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.4 , pp. 1212-1223
    • Bashar, S.1    Ding, Z.2    Li, G.Y.3
  • 84
    • 84878730663 scopus 로고    scopus 로고
    • Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection
    • May
    • N. S. Ferdinand, D. B. Da Costa, and M. Latva-Aho, "Effects of outdated CSI on the secrecy performance of MISO wiretap channels with transmit antenna selection," IEEE Commun. Lett., vol. 17, no. 5, pp. 864-867, May 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.5 , pp. 864-867
    • Ferdinand, N.S.1    Da Costa, D.B.2    Latva-Aho, M.3
  • 85
    • 84903310105 scopus 로고    scopus 로고
    • On secrecy capacity of fast fading MIMOME wiretap channels with statistical CSIT
    • Jun.
    • S.-C. Lin and C.-L. Lin, "On secrecy capacity of fast fading MIMOME wiretap channels with statistical CSIT," IEEE Trans. Wireless Commun., vol. 13, no. 6, pp. 3293-3306, Jun. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.6 , pp. 3293-3306
    • Lin, S.-C.1    Lin, C.-L.2
  • 86
    • 84929353100 scopus 로고    scopus 로고
    • Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere
    • May
    • T.-Y. Liu, P. Mukherjee, S. Ulukus, S.-C. Lin, and Y.-W. P. Hong, "Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2655-2669, May 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.5 , pp. 2655-2669
    • Liu, T.-Y.1    Mukherjee, P.2    Ulukus, S.3    Lin, S.-C.4    Hong, Y.-W.P.5
  • 87
    • 82155167606 scopus 로고    scopus 로고
    • Power allocation and achievable secrecy rates in MISOME wiretap channels
    • Nov.
    • T. V. Nguyen and H. Shin, "Power allocation and achievable secrecy rates in MISOME wiretap channels," IEEE Commun. Lett., vol. 15, no. 11, pp. 1196-1198, Nov. 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.11 , pp. 1196-1198
    • Nguyen, T.V.1    Shin, H.2
  • 88
    • 84897913176 scopus 로고    scopus 로고
    • Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels
    • Mar.
    • S. Yan, N. Yang, R. Malaney, and J. Yuan, "Transmit antenna selection with Alamouti coding and power allocation in MIMO wiretap channels," IEEE Trans. Wireless Commun., vol. 13, no. 3, pp. 1656-1667, Mar. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.3 , pp. 1656-1667
    • Yan, S.1    Yang, N.2    Malaney, R.3    Yuan, J.4
  • 89
    • 84877584209 scopus 로고    scopus 로고
    • Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee
    • Apr.
    • X. Chen and L. Lei, "Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee," IEEE Commun. Lett., vol. 17, no. 4, pp. 637-640, Apr. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.4 , pp. 637-640
    • Chen, X.1    Lei, L.2
  • 90
    • 84953398383 scopus 로고    scopus 로고
    • Secrecy and energy efficiency in MIMO-ME systems
    • Stockholm, Sweden, Jun./Jul.
    • A. Zappone, P.-H. Lin, and E. A. Jorswieck, "Secrecy and energy efficiency in MIMO-ME systems," in Proc. IEEE SPAWC, Stockholm, Sweden, Jun./Jul. 2015, pp. 380-384.
    • (2015) Proc. IEEE SPAWC , pp. 380-384
    • Zappone, A.1    Lin, P.-H.2    Jorswieck, E.A.3
  • 91
    • 84863941590 scopus 로고    scopus 로고
    • Energy-efficient resource allocation for secure OFDMA systems
    • Jul.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Energy-efficient resource allocation for secure OFDMA systems," IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2572-2585, Jul. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.6 , pp. 2572-2585
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 92
    • 84943372153 scopus 로고    scopus 로고
    • Exploiting large-scale MIMO techniques for physical layer security with imperfect channel state information
    • Austin, TX, USA, Dec.
    • X. Chen, C. Yuen, and Z. Zhang, "Exploiting large-scale MIMO techniques for physical layer security with imperfect channel state information," in Proc. IEEE GLOBECOM, Austin, TX, USA, Dec. 2014, pp. 1648-1653.
    • (2014) Proc. IEEE GLOBECOM , pp. 1648-1653
    • Chen, X.1    Yuen, C.2    Zhang, Z.3
  • 93
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun.
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 94
    • 84881111045 scopus 로고    scopus 로고
    • Practical secrecy using artificial noise
    • Jul.
    • S. Liu, Y. Hong, and E. Viterbo, "Practical secrecy using artificial noise," IEEE Commun. Lett., vol. 17, no. 7, pp. 1483-1486, Jul. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.7 , pp. 1483-1486
    • Liu, S.1    Hong, Y.2    Viterbo, E.3
  • 95
    • 84883698532 scopus 로고    scopus 로고
    • On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels
    • Sep.
    • P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, "On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1728-1740, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1728-1740
    • Lin, P.-H.1    Lai, S.-H.2    Lin, S.-C.3    Su, H.-J.4
  • 96
    • 84866621680 scopus 로고    scopus 로고
    • A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap channels via masked beamforming
    • Sep.
    • J. Xiong, K.-K. Wong, D. Ma, and J. Wei, "A closed-form power allocation for minimizing secrecy outage probability for MISO wiretap channels via masked beamforming," IEEE Commun. Lett., vol. 16, no. 9, pp. 1496-1499, Sep. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.9 , pp. 1496-1499
    • Xiong, J.1    Wong, K.-K.2    Ma, D.3    Wei, J.4
  • 97
    • 84883395475 scopus 로고    scopus 로고
    • Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization
    • May
    • Q. Li and W.-K. Ma, "Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization," IEEE Trans. Signal Process., vol. 61, no. 10, pp. 2704-2717, May 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.10 , pp. 2704-2717
    • Li, Q.1    Ma, W.-K.2
  • 98
    • 84930227002 scopus 로고    scopus 로고
    • Artificial noise: Transmission optimization in multi-input single-output wiretap channels
    • May
    • N. Yang et al., "Artificial noise: Transmission optimization in multi-input single-output wiretap channels," IEEE Trans. Commun., vol. 63, no. 5, pp. 1771-1783, May 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.5 , pp. 1771-1783
    • Yang, N.1
  • 99
    • 84890426484 scopus 로고    scopus 로고
    • Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty
    • Nov.
    • Y. Tang, J. Xiong, D. Ma, and X. Zhang, "Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty," IEEE Commun. Lett., vol. 17, no. 11, pp. 2096-2099, Nov. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.11 , pp. 2096-2099
    • Tang, Y.1    Xiong, J.2    Ma, D.3    Zhang, X.4
  • 100
    • 84921324940 scopus 로고    scopus 로고
    • Secrecy rate maximization with artificialnoise-aided beamforming for MISO wiretap channels under secrecy outage constraint
    • Jan.
    • B. Wang, P. Mu, and Z. Li, "Secrecy rate maximization with artificialnoise-aided beamforming for MISO wiretap channels under secrecy outage constraint," IEEE Commun. Lett., vol. 19, no. 1, pp. 18-21, Jan. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.1 , pp. 18-21
    • Wang, B.1    Mu, P.2    Li, Z.3
  • 101
    • 84903291683 scopus 로고    scopus 로고
    • Power allocation for artificial-noise secure MIMO precoding systems
    • Jul.
    • S.-H. Tsai and H. V. Poor, "Power allocation for artificial-noise secure MIMO precoding systems," IEEE Trans. Signal Process., vol. 62, no. 13, pp. 3479-3493, Jul. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.13 , pp. 3479-3493
    • Tsai, S.-H.1    Poor, H.V.2
  • 102
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • Oct.
    • X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.R.2
  • 103
    • 84879203277 scopus 로고    scopus 로고
    • On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels
    • Jun.
    • X. Zhang, X. Zhou, and M. R. McKay, "On the design of artificialnoise-aided secure multi-antenna transmission in slow fading channels," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2170-2181, Jun. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2170-2181
    • Zhang, X.1    Zhou, X.2    McKay, M.R.3
  • 104
    • 79952985755 scopus 로고    scopus 로고
    • On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem
    • Mar.
    • S.-C. Lin, T.-H. Chang, Y.-L. Liang, Y.-W. P. Hong, and C.-Y. Chi, "On the impact of quantized channel feedback in guaranteeing secrecy with artificial noise: The noise leakage problem," IEEE Trans. Wireless Commun., vol. 10, no. 3, pp. 901-915, Mar. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.3 , pp. 901-915
    • Lin, S.-C.1    Chang, T.-H.2    Liang, Y.-L.3    Hong, Y.-W.P.4    Chi, C.-Y.5
  • 105
    • 84929330256 scopus 로고    scopus 로고
    • Artificialnoise-aided secure multi-antenna transmission with limited feedback
    • May
    • X. Zhang, M. R. McKay, X. Zhou, and R. W. Heath, Jr., "Artificialnoise-aided secure multi-antenna transmission with limited feedback," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2742-2754, May 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.5 , pp. 2742-2754
    • Zhang, X.1    McKay, M.R.2    Zhou, X.3    Heath, R.W.4
  • 106
    • 85008520301 scopus 로고    scopus 로고
    • Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation
    • Aug.
    • Y. Yang, W. Wang, H. Zhao, and L. Zhao, "Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation," J. Commun. Netw., vol. 14, no. 4, pp. 374-384, Aug. 2012.
    • (2012) J. Commun. Netw. , vol.14 , Issue.4 , pp. 374-384
    • Yang, Y.1    Wang, W.2    Zhao, H.3    Zhao, L.4
  • 107
    • 84867873837 scopus 로고    scopus 로고
    • Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis
    • Oct.
    • W. Li, M. Ghogho, B. Chen, and C. Xiong, "Secure communication via sending artificial noise by the receiver: Outage secrecy capacity/region analysis," IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.10 , pp. 1628-1631
    • Li, W.1    Ghogho, M.2    Chen, B.3    Xiong, C.4
  • 108
    • 84899797495 scopus 로고    scopus 로고
    • Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization
    • Jul.
    • Y. Zhou, Z. Z. Xiang, Y. Zhu, and Z. Xue, "Application of full-duplex wireless technique into secure MIMO communication: Achievable secrecy rate based optimization," IEEE Signal Process. Lett., vol. 21, no. 7, pp. 804-808, Jul. 2014.
    • (2014) IEEE Signal Process. Lett. , vol.21 , Issue.7 , pp. 804-808
    • Zhou, Y.1    Xiang, Z.Z.2    Zhu, Y.3    Xue, Z.4
  • 109
    • 84902184327 scopus 로고    scopus 로고
    • A high data rate wireless communication system with improved secrecy: Full duplex beamforming
    • Jun.
    • Ö. Cepheli, S. Tedik, and G. K. Kurt, "A high data rate wireless communication system with improved secrecy: Full duplex beamforming," IEEE Commun. Lett., vol. 18, no. 6, pp. 1075-1078, Jun. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.6 , pp. 1075-1078
    • Cepheli, Ö.1    Tedik, S.2    Kurt, G.K.3
  • 110
    • 80052913251 scopus 로고    scopus 로고
    • Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer
    • Oct.
    • S. A. A. Fakoorian and A. L. Swindlehurst, "Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 5013-5022, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 5013-5022
    • Fakoorian, S.A.A.1    Swindlehurst, A.L.2
  • 111
    • 84893411461 scopus 로고    scopus 로고
    • A general framework of wiretap channel with helping interference and state information
    • Feb.
    • P. Xu, Z. Ding, X. Dai, and K. K. Leung, "A general framework of wiretap channel with helping interference and state information," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 182-195, Feb. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.2 , pp. 182-195
    • Xu, P.1    Ding, Z.2    Dai, X.3    Leung, K.K.4
  • 112
    • 84878400311 scopus 로고    scopus 로고
    • Uncoordinated cooperative jamming for secret communications
    • Jul.
    • S. Luo, J. Li, and A. P. Petropulu, "Uncoordinated cooperative jamming for secret communications," IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1081-1090, Jul. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.7 , pp. 1081-1090
    • Luo, S.1    Li, J.2    Petropulu, A.P.3
  • 113
    • 84995684459 scopus 로고    scopus 로고
    • On secrecy performance of multiantenna-jammer-aided secure communications with imperfect CSI
    • Oct.
    • X. Chen, J. Chen, H. Zhang, Y. Zhang, and C. Yuen, "On secrecy performance of multiantenna-jammer-aided secure communications with imperfect CSI," IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8014-8024, Oct. 2016.
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.10 , pp. 8014-8024
    • Chen, X.1    Chen, J.2    Zhang, H.3    Zhang, Y.4    Yuen, C.5
  • 114
    • 51649109883 scopus 로고    scopus 로고
    • On the secrecy capacity of fading wireless channel with multiple eavesdroppers
    • Nice, France, Jun.
    • P. Wang, G. Yu, and Z. Zhang, "On the secrecy capacity of fading wireless channel with multiple eavesdroppers," in Proc. IEEE ISIT, Nice, France, Jun. 2007, pp. 1301-1305.
    • (2007) Proc. IEEE ISIT , pp. 1301-1305
    • Wang, P.1    Yu, G.2    Zhang, Z.3
  • 115
    • 84901947419 scopus 로고    scopus 로고
    • Secure multipleinput single-output communication-Part II: δ-secrecy symbol error probability and secrecy diversity
    • May
    • T. V. Nguyen, Y. Jeong, J. S. Kwak, and H. Shin, "Secure multipleinput single-output communication-Part II: δ-secrecy symbol error probability and secrecy diversity," IET Commun., vol. 8, no. 8, pp. 1227-1238, May 2014.
    • (2014) IET Commun. , vol.8 , Issue.8 , pp. 1227-1238
    • Nguyen, T.V.1    Jeong, Y.2    Kwak, J.S.3    Shin, H.4
  • 116
    • 84962184376 scopus 로고    scopus 로고
    • Secrecy rate optimizations for a MISO secrecy channel with multiple multiantenna eavesdroppers
    • Jan.
    • Z. Chu, H. Xing, M. Johnston, and S. L. Goff, "Secrecy rate optimizations for a MISO secrecy channel with multiple multiantenna eavesdroppers," IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 283-297, Jan. 2016.
    • (2016) IEEE Trans. Wireless Commun. , vol.15 , Issue.1 , pp. 283-297
    • Chu, Z.1    Xing, H.2    Johnston, M.3    Goff, S.L.4
  • 117
    • 79951595646 scopus 로고    scopus 로고
    • QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach
    • Mar.
    • W.-C. Liao, T.-H. Chang, W.-K. Ma, and C.-Y. Chi, "QoS-based transmit beamforming in the presence of eavesdroppers: An optimized artificial-noise-aided approach," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1202-1216, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1202-1216
    • Liao, W.-C.1    Chang, T.-H.2    Ma, W.-K.3    Chi, C.-Y.4
  • 118
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep.
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 119
    • 80855123713 scopus 로고    scopus 로고
    • Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks
    • Oct.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Secure resource allocation and scheduling for OFDMA decode-and-forward relay networks," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3528-3540, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3528-3540
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 120
    • 80054058314 scopus 로고    scopus 로고
    • Optimal power allocation for secure multicarrier relay systems
    • Nov.
    • C. Jeong and I.-M. Kim, "Optimal power allocation for secure multicarrier relay systems," IEEE Trans. Signal Process., vol. 59, no. 11, pp. 5428-5442, Nov. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.11 , pp. 5428-5442
    • Jeong, C.1    Kim, I.-M.2
  • 121
    • 84961839468 scopus 로고    scopus 로고
    • Multi-antenna relay aided wireless physical layer security
    • Dec.
    • X. Chen, C. Zhong, C. Yuen, and H.-H. Chen, "Multi-antenna relay aided wireless physical layer security," IEEE Commun. Mag., vol. 53, no. 12, pp. 40-46, Dec. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.12 , pp. 40-46
    • Chen, X.1    Zhong, C.2    Yuen, C.3    Chen, H.-H.4
  • 122
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar.
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process. , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 124
    • 36248968306 scopus 로고    scopus 로고
    • Towards the optimal amplify-and-forward cooperative diversity scheme
    • Sep.
    • S. Yang and J.-C. Belfiore, "Towards the optimal amplify-and-forward cooperative diversity scheme," IEEE Trans. Inf. Theory, vol. 53, no. 9, pp. 3114-3126, Sep. 2007.
    • (2007) IEEE Trans. Inf. Theory , vol.53 , Issue.9 , pp. 3114-3126
    • Yang, S.1    Belfiore, J.-C.2
  • 125
    • 68949180348 scopus 로고    scopus 로고
    • Recent advances in amplify-and-forward two-hop relaying
    • Jul.
    • S. Berger, M. Kuhn, A. Wittneben, T. Unger, and A. Klein, "Recent advances in amplify-and-forward two-hop relaying," IEEE Commun. Mag., vol. 47, no. 7, pp. 50-56, Jul. 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.7 , pp. 50-56
    • Berger, S.1    Kuhn, M.2    Wittneben, A.3    Unger, T.4    Klein, A.5
  • 126
    • 34247619637 scopus 로고    scopus 로고
    • Highperformance cooperative demodulation with decode-and-forward relays
    • Jul.
    • T. Wang, A. Cano, G. B. Giannakis, and J. N. Laneman, "Highperformance cooperative demodulation with decode-and-forward relays," IEEE Trans. Commun., vol. 55, no. 7, pp. 1427-1438, Jul. 2007.
    • (2007) IEEE Trans. Commun. , vol.55 , Issue.7 , pp. 1427-1438
    • Wang, T.1    Cano, A.2    Giannakis, G.B.3    Laneman, J.N.4
  • 127
    • 34547730230 scopus 로고    scopus 로고
    • Channel estimation for amplify and forward relay based cooperation diversity systems
    • Jun.
    • C. S. Patel and G. L. Stuber, "Channel estimation for amplify and forward relay based cooperation diversity systems," IEEE Trans. Wireless Commun., vol. 6, no. 6, pp. 2348-2356, Jun. 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.6 , pp. 2348-2356
    • Patel, C.S.1    Stuber, G.L.2
  • 128
    • 47149095276 scopus 로고    scopus 로고
    • Diversity order analysis of the decode-andforward cooperative networks with relay selection
    • May
    • Z. Yi and I.-M. Kim, "Diversity order analysis of the decode-andforward cooperative networks with relay selection," IEEE Trans. Wireless Commun., vol. 7, no. 5, pp. 1792-1799, May 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.5 , pp. 1792-1799
    • Yi, Z.1    Kim, I.-M.2
  • 129
    • 77951604986 scopus 로고    scopus 로고
    • Ergodic capacity analysis of amplify-and-forward MIMO dual-hop system
    • May
    • S. Jin, M. R. McKay, C. Zhong, and K.-K. Wong, "Ergodic capacity analysis of amplify-and-forward MIMO dual-hop system," IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2204-2224, May 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.5 , pp. 2204-2224
    • Jin, S.1    McKay, M.R.2    Zhong, C.3    Wong, K.-K.4
  • 130
    • 84904819613 scopus 로고    scopus 로고
    • Ergodic capacity comparison of different relay precoding schemes in dual-hop AF systems with co-channel interference
    • Jul.
    • G. Zhu et al., "Ergodic capacity comparison of different relay precoding schemes in dual-hop AF systems with co-channel interference," IEEE Trans. Commun., vol. 62, no. 7, pp. 2314-2328, Jul. 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.7 , pp. 2314-2328
    • Zhu, G.1
  • 131
    • 84904282993 scopus 로고    scopus 로고
    • Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks
    • Aug.
    • H.-M. Wang, F. Liu, and X.-G. Xia, "Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1240-1250, Aug. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.8 , pp. 1240-1250
    • Wang, H.-M.1    Liu, F.2    Xia, X.-G.3
  • 132
    • 84931060336 scopus 로고    scopus 로고
    • The achievable secrecy rate of multi-antenna AF relaying using joint transmit and receive beamforming
    • Sep.
    • M. Mirzaee and S. Akhlaghi, "The achievable secrecy rate of multi-antenna AF relaying using joint transmit and receive beamforming," in Proc. IST, Sep. 2014, pp. 1122-1127.
    • (2014) Proc. IST , pp. 1122-1127
    • Mirzaee, M.1    Akhlaghi, S.2
  • 133
    • 84879149313 scopus 로고    scopus 로고
    • Secure relay beamforming with imperfect channel side information
    • Jun.
    • X. Wang, K. Wang, and X.-D. Zhang, "Secure relay beamforming with imperfect channel side information," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, Jun. 2013.
    • (2013) IEEE Trans. Veh. Technol. , vol.62 , Issue.5 , pp. 2140-2155
    • Wang, X.1    Wang, K.2    Zhang, X.-D.3
  • 134
    • 84870554789 scopus 로고    scopus 로고
    • Cooperative secure beamforming for AF relay networks with multiple eavesdropper
    • Jan.
    • Y. Yang, Q. Li, W.-K. Ma, J. Ge, and P. C. Ching, "Cooperative secure beamforming for AF relay networks with multiple eavesdropper," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 35-38, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 35-38
    • Yang, Y.1    Li, Q.2    Ma, W.-K.3    Ge, J.4    Ching, P.C.5
  • 135
    • 84865017592 scopus 로고    scopus 로고
    • Joint SVD-GSVD precoding technique and secrecy capacity lower bound for the MIMO relay wire-tap channel
    • Yokohama, Japan, May
    • M. Jilani and T. Ohtsuki, "Joint SVD-GSVD precoding technique and secrecy capacity lower bound for the MIMO relay wire-tap channel," in Proc. IEEE VTC Spring, Yokohama, Japan, May 2012, pp. 1-5.
    • (2012) Proc. IEEE VTC Spring , pp. 1-5
    • Jilani, M.1    Ohtsuki, T.2
  • 136
    • 80052870842 scopus 로고    scopus 로고
    • On cooperative relaying schemes for wireless physical layer security
    • Oct.
    • J. Li, A. P. Petropulu, and S. Weber, "On cooperative relaying schemes for wireless physical layer security," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4985-4997
    • Li, J.1    Petropulu, A.P.2    Weber, S.3
  • 137
    • 84946607375 scopus 로고    scopus 로고
    • Large-scale MIMO relaying techniques for physical layer security: AF or DF?
    • Sep.
    • X. Chen, L. Lei, H. Zhang, and C. Yuen, "Large-scale MIMO relaying techniques for physical layer security: AF or DF?" IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5135-5146, Sep. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.9 , pp. 5135-5146
    • Chen, X.1    Lei, L.2    Zhang, H.3    Yuen, C.4
  • 138
    • 84862571591 scopus 로고    scopus 로고
    • Relay placement for physical layer security: A secure connection perspective
    • Jun.
    • J. Mo, M. Tao, and Y. Liu, "Relay placement for physical layer security: A secure connection perspective," IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.6 , pp. 878-881
    • Mo, J.1    Tao, M.2    Liu, Y.3
  • 139
    • 84928642759 scopus 로고    scopus 로고
    • Secure compute-andforward in a bidirectional relay
    • May
    • S. Vatedka, N. Kashyap, and A. Thangaraj, "Secure compute-andforward in a bidirectional relay," IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2531-2556, May 2015.
    • (2015) IEEE Trans. Inf. Theory , vol.61 , Issue.5 , pp. 2531-2556
    • Vatedka, S.1    Kashyap, N.2    Thangaraj, A.3
  • 140
    • 84979766980 scopus 로고    scopus 로고
    • Modify-and-forward for securing cooperative relay communications
    • Zürich, Switzerland, Feb.
    • S. W. Kim, "Modify-and-forward for securing cooperative relay communications," in Proc. Int. Zurich Seminar Commun., Zürich, Switzerland, Feb. 2014, pp. 136-139.
    • (2014) Proc. Int. Zurich Seminar Commun. , pp. 136-139
    • Kim, S.W.1
  • 141
    • 80052889357 scopus 로고    scopus 로고
    • Cooperative jamming for secure communications in MIMO relay networks
    • Oct.
    • J. Huang and A. L. Swindlehurst, "Cooperative jamming for secure communications in MIMO relay networks," IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4871-4884, Oct. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.10 , pp. 4871-4884
    • Huang, J.1    Swindlehurst, A.L.2
  • 142
    • 78650858776 scopus 로고    scopus 로고
    • On the secure degrees of freedom of relaying with half-duplex feedback
    • Jan.
    • T. T. Kim and H. V. Poor, "On the secure degrees of freedom of relaying with half-duplex feedback," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 291-302, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 291-302
    • Kim, T.T.1    Poor, H.V.2
  • 143
    • 84921657602 scopus 로고    scopus 로고
    • Secure beamforming based on sparsity in multiple amplify-and-forward MIMO relay networks
    • Hefei, China, Oct.
    • M. Zhao, S. Feng, Y. Liu, and X. Wang, "Secure beamforming based on sparsity in multiple amplify-and-forward MIMO relay networks," in Proc. IEEE WCSP, Hefei, China, Oct. 2014, pp. 1-6.
    • (2014) Proc. IEEE WCSP , pp. 1-6
    • Zhao, M.1    Feng, S.2    Liu, Y.3    Wang, X.4
  • 144
    • 84862963131 scopus 로고    scopus 로고
    • Joint relay and jammer selection for secure two-way relay networks
    • Feb.
    • J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, "Joint relay and jammer selection for secure two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.1 , pp. 310-320
    • Chen, J.1    Zhang, R.2    Song, L.3    Han, Z.4    Jiao, B.5
  • 145
    • 84889603798 scopus 로고    scopus 로고
    • The role of feedback in two-way secure communications
    • Dec.
    • X. He and A. Yener, "The role of feedback in two-way secure communications," IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8115-8130, Dec. 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.12 , pp. 8115-8130
    • He, X.1    Yener, A.2
  • 146
    • 84912067811 scopus 로고    scopus 로고
    • Joint resource allocation in secure two-way relay networks with QoS guarantee and fairness
    • Istanbul, Turkey, Apr.
    • J. Zhao, W. Zheng, X. Wen, and L. Zhang, "Joint resource allocation in secure two-way relay networks with QoS guarantee and fairness," in Proc. IEEE WCNC, Istanbul, Turkey, Apr. 2014, pp. 1985-1989.
    • (2014) Proc. IEEE WCNC , pp. 1985-1989
    • Zhao, J.1    Zheng, W.2    Wen, X.3    Zhang, L.4
  • 147
    • 67650587787 scopus 로고    scopus 로고
    • Optimal beamforming for two-way multi-antenna relay channel with analogue network coding
    • Jun.
    • R. Zhang, Y.-C. Liang, C. C. Chai, and S. Cui, "Optimal beamforming for two-way multi-antenna relay channel with analogue network coding," IEEE J. Sel. Areas Commun., vol. 27, no. 5, pp. 699-712, Jun. 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.5 , pp. 699-712
    • Zhang, R.1    Liang, Y.-C.2    Chai, C.C.3    Cui, S.4
  • 148
    • 84881372976 scopus 로고    scopus 로고
    • Joint networkchannel coding with rateless code in two-way relay systems
    • Jul.
    • Y. Zhang, Z. Zhang, R. Yin, G. Yu, and W. Wang, "Joint networkchannel coding with rateless code in two-way relay systems," IEEE Trans. Wireless Commun., vol. 12, no. 7, pp. 3158-3169, Jul. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.7 , pp. 3158-3169
    • Zhang, Y.1    Zhang, Z.2    Yin, R.3    Yu, G.4    Wang, W.5
  • 149
    • 78650893906 scopus 로고    scopus 로고
    • Secure network coding on a wiretap network
    • Jan.
    • N. Cai and R. W. Yeung, "Secure network coding on a wiretap network," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 424-435, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 424-435
    • Cai, N.1    Yeung, R.W.2
  • 150
    • 84949921982 scopus 로고    scopus 로고
    • Beamforming for secure two-way relay networks with physical layer network coding
    • Austin, TX, USA, Dec.
    • C. Zhang, H. Gao, T. Lv, Y. Lu, and X. Su, "Beamforming for secure two-way relay networks with physical layer network coding," in Proc. IEEE GLOBECOM, Austin, TX, USA, Dec. 2014, pp. 1734-1739.
    • (2014) Proc. IEEE GLOBECOM , pp. 1734-1739
    • Zhang, C.1    Gao, H.2    Lv, T.3    Lu, Y.4    Su, X.5
  • 151
    • 84904303963 scopus 로고    scopus 로고
    • Secure beamforming design for physical layer network coding based MIMO two-way relaying
    • Jul.
    • K. Jayasinghe, P. Jayasinghe, N. Rajatheva, and M. Latva-Aho, "Secure beamforming design for physical layer network coding based MIMO two-way relaying," IEEE Commun. Lett., vol. 18, no. 7, pp. 1270-1273, Jul. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.7 , pp. 1270-1273
    • Jayasinghe, K.1    Jayasinghe, P.2    Rajatheva, N.3    Latva-Aho, M.4
  • 152
    • 78751521977 scopus 로고    scopus 로고
    • Securing multi-antenna twoway relay channels with analog network coding against eavesdroppers
    • Marrakesh, Morocco, Jun.
    • A. Mukherjee and A. L. Swindlehurst, "Securing multi-antenna twoway relay channels with analog network coding against eavesdroppers," in Proc. IEEE SPAWC, Marrakesh, Morocco, Jun. 2010, pp. 1-5.
    • (2010) Proc. IEEE SPAWC , pp. 1-5
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 153
    • 84871761876 scopus 로고    scopus 로고
    • Full-duplex relay selection for amplify-and-forward cooperative networks
    • Dec.
    • I. Krikidis, H. A. Suraweera, P. J. Smith, and C. Yuen, "Full-duplex relay selection for amplify-and-forward cooperative networks," IEEE Trans. Wireless Commun., vol. 11, no. 12, pp. 4381-4393, Dec. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.12 , pp. 4381-4393
    • Krikidis, I.1    Suraweera, H.A.2    Smith, P.J.3    Yuen, C.4
  • 154
    • 84861187791 scopus 로고    scopus 로고
    • Dynamic resource allocation in MIMO-OFDMA systems with full-duplex and hybrid relaying
    • May
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Dynamic resource allocation in MIMO-OFDMA systems with full-duplex and hybrid relaying," IEEE Trans. Commun., vol. 60, no. 5, pp. 1291-1304, May 2012.
    • (2012) IEEE Trans. Commun. , vol.60 , Issue.5 , pp. 1291-1304
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 155
    • 84899653230 scopus 로고    scopus 로고
    • Grassmannian signalling achieves tight bounds on the ergodic high-SNR capacity of the noncoherent MIMO full-duplex relay channel
    • May
    • R. H. Gohary and H. Yanikomeroglu, "Grassmannian signalling achieves tight bounds on the ergodic high-SNR capacity of the noncoherent MIMO full-duplex relay channel," IEEE Trans. Inf. Theory, vol. 60, no. 5, pp. 2480-2494, May 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.5 , pp. 2480-2494
    • Gohary, R.H.1    Yanikomeroglu, H.2
  • 156
    • 84927708955 scopus 로고    scopus 로고
    • Full-duplex relay for enhancing physical layer security in multi-hop relaying systems
    • Apr.
    • J.-H. Lee, "Full-duplex relay for enhancing physical layer security in multi-hop relaying systems," IEEE Commun. Lett., vol. 19, no. 4, pp. 525-528, Apr. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.4 , pp. 525-528
    • Lee, J.-H.1
  • 157
    • 84922811042 scopus 로고    scopus 로고
    • Physical layer network security in the full-duplex relay system
    • Mar.
    • G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system," IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 574-583, Mar. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.3 , pp. 574-583
    • Chen, G.1    Gong, Y.2    Xiao, P.3    Chambers, J.A.4
  • 158
    • 84916918571 scopus 로고    scopus 로고
    • On the performance of secure full-duplex relaying under composite fading channels
    • Jul.
    • H. Alves, G. Brante, R. D. Souza, D. B. da Costa, and M. Latva-Aho, "On the performance of secure full-duplex relaying under composite fading channels," IEEE Signal Process. Lett., vol. 22, no. 7, pp. 867-870, Jul. 2015.
    • (2015) IEEE Signal Process. Lett. , vol.22 , Issue.7 , pp. 867-870
    • Alves, H.1    Brante, G.2    Souza, R.D.3    Da Costa, D.B.4    Latva-Aho, M.5
  • 159
    • 70449476498 scopus 로고    scopus 로고
    • Secure diversitymultiplexing tradeoffs in MIMO relay channels
    • Seoul, South Korea, Jul.
    • K. T. Gowda, T. Q. S. Quek, and H. Shin, "Secure diversitymultiplexing tradeoffs in MIMO relay channels," in Proc. IEEE ISIT, Seoul, South Korea, Jul. 2009, pp. 1433-1437.
    • (2009) Proc. IEEE ISIT , pp. 1433-1437
    • Gowda, K.T.1    Quek, T.Q.S.2    Shin, H.3
  • 160
    • 85008537206 scopus 로고    scopus 로고
    • Secure communication in multiple relay networks through decode-and-forward strategies
    • Aug.
    • R. Bassily and S. Ulukus, "Secure communication in multiple relay networks through decode-and-forward strategies," J. Commun. Netw., vol. 14, no. 4, pp. 352-363, Aug. 2012.
    • (2012) J. Commun. Netw. , vol.14 , Issue.4 , pp. 352-363
    • Bassily, R.1    Ulukus, S.2
  • 161
    • 84944320504 scopus 로고    scopus 로고
    • Full-duplex relay with jamming protocol for improving physical-layer security
    • Washington, DC, USA, Sep.
    • S. Parsaeefard and T. Le-Ngoc, "Full-duplex relay with jamming protocol for improving physical-layer security," in Proc. IEEE PIMRC, Washington, DC, USA, Sep. 2014, pp. 129-133.
    • (2014) Proc. IEEE PIMRC , pp. 129-133
    • Parsaeefard, S.1    Le-Ngoc, T.2
  • 162
    • 84896908427 scopus 로고    scopus 로고
    • Max-ratio relay selection in secure buffer-aided cooperative wireless networks
    • Apr.
    • G. Chen, Z. Tian, Y. Gong, Z. Chen, and J. A. Chambers, "Max-ratio relay selection in secure buffer-aided cooperative wireless networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 719-729, Apr. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.4 , pp. 719-729
    • Chen, G.1    Tian, Z.2    Gong, Y.3    Chen, Z.4    Chambers, J.A.5
  • 163
    • 70350583050 scopus 로고    scopus 로고
    • Relay selection for secure cooperative networks with jamming
    • Oct.
    • I. Krikidis, J. S. Thompson, and S. McLaughlin, "Relay selection for secure cooperative networks with jamming," IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.10 , pp. 5003-5011
    • Krikidis, I.1    Thompson, J.S.2    McLaughlin, S.3
  • 164
    • 84883052221 scopus 로고    scopus 로고
    • An effective secure transmission scheme for AF relay networks with two-hop information leakage
    • Aug.
    • M. Lin, J. Ge, and Y. Yang, "An effective secure transmission scheme for AF relay networks with two-hop information leakage," IEEE Commun. Lett., vol. 17, no. 8, pp. 1676-1679, Aug. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.8 , pp. 1676-1679
    • Lin, M.1    Ge, J.2    Yang, Y.3
  • 165
    • 84856271363 scopus 로고    scopus 로고
    • On the application of cooperative transmission to secrecy communications
    • Feb.
    • Z. Ding, K. K. Leung, D. L. Goeckel, and D. Towsley, "On the application of cooperative transmission to secrecy communications," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 359-368, Feb. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.2 , pp. 359-368
    • Ding, Z.1    Leung, K.K.2    Goeckel, D.L.3    Towsley, D.4
  • 166
    • 84870512709 scopus 로고    scopus 로고
    • Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI
    • Jan.
    • H.-M. Wang, M. Luo, X.-G. Xia, and Q. Yin, "Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper's CSI," IEEE Signal Process. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
    • (2013) IEEE Signal Process. Lett. , vol.20 , Issue.1 , pp. 39-42
    • Wang, H.-M.1    Luo, M.2    Xia, X.-G.3    Yin, Q.4
  • 167
    • 84904614329 scopus 로고    scopus 로고
    • Security versus reliability analysis of opportunistic relaying
    • Jul.
    • Y. Zou, X. Wang, W. Shen, and L. Hanzo, "Security versus reliability analysis of opportunistic relaying," IEEE Trans. Veh. Technol., vol. 63, no. 6, pp. 2653-2661, Jul. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.6 , pp. 2653-2661
    • Zou, Y.1    Wang, X.2    Shen, W.3    Hanzo, L.4
  • 168
    • 79951618084 scopus 로고    scopus 로고
    • Optimal cooperative jamming to enhance physical layer security using relays
    • Mar.
    • G. Zheng, L.-C. Choo, and K.-K. Wang, "Optimal cooperative jamming to enhance physical layer security using relays," IEEE Trans. Signal Process., vol. 59, no. 3, pp. 1317-1322, Mar. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.3 , pp. 1317-1322
    • Zheng, G.1    Choo, L.-C.2    Wang, K.-K.3
  • 169
    • 84888318377 scopus 로고    scopus 로고
    • Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks
    • Dec.
    • H.-M. Wang, M. Luo, Q. Yin, and X.-G. Xia, "Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 2007-2020, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 2007-2020
    • Wang, H.-M.1    Luo, M.2    Yin, Q.3    Xia, X.-G.4
  • 170
    • 84930198060 scopus 로고    scopus 로고
    • Opportunistic relay selection for secrecy enhancement in cooperative networks
    • May
    • F. S. Al-Qahtani, C. Zhong, and H. M. Alnuweiri, "Opportunistic relay selection for secrecy enhancement in cooperative networks," IEEE Trans. Commun., vol. 63, no. 5, pp. 1756-1770, May 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.5 , pp. 1756-1770
    • Al-Qahtani, F.S.1    Zhong, C.2    Alnuweiri, H.M.3
  • 171
    • 84946240351 scopus 로고    scopus 로고
    • Robust joint beamforming and jamming for secure AF networks: Low-complexity design
    • May
    • C. Wang and H.-M. Wang, "Robust joint beamforming and jamming for secure AF networks: Low-complexity design," IEEE Trans. Veh. Technol., vol. 64, no. 5, pp. 2192-2198, May 2015.
    • (2015) IEEE Trans. Veh. Technol. , vol.64 , Issue.5 , pp. 2192-2198
    • Wang, C.1    Wang, H.-M.2
  • 172
    • 84917671161 scopus 로고    scopus 로고
    • Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks
    • Jan.
    • Q. Li et al., "Robust cooperative beamforming and artificial noise design for physical-layer secrecy in AF multi-antenna multi-relay networks," IEEE Trans. Signal Process., vol. 63, no. 1, pp. 206-220, Jan. 2015.
    • (2015) IEEE Trans. Signal Process. , vol.63 , Issue.1 , pp. 206-220
    • Li, Q.1
  • 173
    • 84891354137 scopus 로고    scopus 로고
    • Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI
    • Budapest, Hungary, Jun.
    • S. Vishwakarma and A. Chockalingam, "Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI," in Proc. IEEE ICC, Budapest, Hungary, Jun. 2013, pp. 3047-3052.
    • (2013) Proc. IEEE ICC , pp. 3047-3052
    • Vishwakarma, S.1    Chockalingam, A.2
  • 174
    • 84922896499 scopus 로고    scopus 로고
    • Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks
    • Feb.
    • C. Wang, H.-M. Wang, and X.-G. Xia, "Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 589-605, Feb. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.2 , pp. 589-605
    • Wang, C.1    Wang, H.-M.2    Xia, X.-G.3
  • 175
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug.
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807-3827, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.8 , pp. 3807-3827
    • He, X.1    Yener, A.2
  • 176
    • 84856969548 scopus 로고    scopus 로고
    • Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
    • Baltimore, MD, USA, Nov.
    • Q. Zhu, W. Saad, Z. Han, H. V. Poor, and T. Başar, "Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach," in Proc. MILCOM, Baltimore, MD, USA, Nov. 2011, pp. 119-124.
    • (2011) Proc. MILCOM , pp. 119-124
    • Zhu, Q.1    Saad, W.2    Han, Z.3    Poor, H.V.4    Başar, T.5
  • 177
    • 84924902824 scopus 로고    scopus 로고
    • Security-aware relaying scheme for cooperative networks with untrusted relay nodes
    • Mar.
    • L. Sun, P. Ren, Q. Du, Y. Wang, and Z. Gao, "Security-aware relaying scheme for cooperative networks with untrusted relay nodes," IEEE Commun. Lett., vol. 19, no. 3, pp. 463-466, Mar. 2015.
    • (2015) IEEE Commun. Lett. , vol.19 , Issue.3 , pp. 463-466
    • Sun, L.1    Ren, P.2    Du, Q.3    Wang, Y.4    Gao, Z.5
  • 178
    • 84985015755 scopus 로고    scopus 로고
    • Relay selection for secure successive AF relaying networks with untrusted nodes
    • Nov.
    • W. Wang, K. C. Teh, and K. H. Li, "Relay selection for secure successive AF relaying networks with untrusted nodes," IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2466-2476, Nov. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.11 , pp. 2466-2476
    • Wang, W.1    Teh, K.C.2    Li, K.H.3
  • 179
    • 84903317482 scopus 로고    scopus 로고
    • Secure transmission with optimal power allocation in untrusted relay networks
    • Jun.
    • L. Wang, M. Elkashlan, J. Huang, N. H. Tran, and T. Q. Duong, "Secure transmission with optimal power allocation in untrusted relay networks," IEEE Wireless Commun. Lett., vol. 3, no. 3, pp. 289-292, Jun. 2014.
    • (2014) IEEE Wireless Commun. Lett. , vol.3 , Issue.3 , pp. 289-292
    • Wang, L.1    Elkashlan, M.2    Huang, J.3    Tran, N.H.4    Duong, T.Q.5
  • 180
    • 84901257838 scopus 로고    scopus 로고
    • Joint transmit design and node selection for one-way and two-way untrusted relay channels
    • Pacific Grove, CA, USA, Nov.
    • J. Huang and A. L. Swindlehurst, "Joint transmit design and node selection for one-way and two-way untrusted relay channels," in Proc. Asilomar SSC, Pacific Grove, CA, USA, Nov. 2013, pp. 1555-1559.
    • (2013) Proc. Asilomar SSC , pp. 1555-1559
    • Huang, J.1    Swindlehurst, A.L.2
  • 181
    • 84898039745 scopus 로고    scopus 로고
    • Secure beamforming for MIMO two-way communications with an untrusted relay
    • May
    • J. Mo, M. Tao, Y. Liu, and R. Wang, "Secure beamforming for MIMO two-way communications with an untrusted relay," IEEE Trans. Signal Process., vol. 62, no. 9, pp. 2185-2199, May 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.9 , pp. 2185-2199
    • Mo, J.1    Tao, M.2    Liu, Y.3    Wang, R.4
  • 182
    • 84867799883 scopus 로고    scopus 로고
    • Physical layer security for two-way untrusted relaying with friendly jammers
    • Oct.
    • R. Zhang, L. Song, Z. Han, and B. Jiao, "Physical layer security for two-way untrusted relaying with friendly jammers," IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693-3704, Oct. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.8 , pp. 3693-3704
    • Zhang, R.1    Song, L.2    Han, Z.3    Jiao, B.4
  • 183
    • 85032751997 scopus 로고    scopus 로고
    • From single user to multiuser communications: Shifting the MIMO paradigm
    • Oct.
    • D. Gesbert, M. Kountouris, R. W. Heath, Jr., C. B. Chae, and T. Salzer, "From single user to multiuser communications: Shifting the MIMO paradigm," IEEE Signal Process. Mag., vol. 24, no. 5, pp. 36-46, Oct. 2007.
    • (2007) IEEE Signal Process. Mag. , vol.24 , Issue.5 , pp. 36-46
    • Gesbert, D.1    Kountouris, M.2    Heath, R.W.3    Chae, C.B.4    Salzer, T.5
  • 184
    • 70449567914 scopus 로고    scopus 로고
    • Multi-user MIMO systems: The future in the making
    • Nov./Dec.
    • K. Kurve, "Multi-user MIMO systems: The future in the making," IEEE Potentials, vol. 28, no. 6, pp. 37-42, Nov./Dec. 2009.
    • (2009) IEEE Potentials , vol.28 , Issue.6 , pp. 37-42
    • Kurve, K.1
  • 185
    • 84857368789 scopus 로고    scopus 로고
    • Adaptive mode selection for multiuser MIMO downlink employing rateless codes with QoS provisioning
    • Feb.
    • X. Chen, Z. Zhang, S. Chen, and C. Wang, "Adaptive mode selection for multiuser MIMO downlink employing rateless codes with QoS provisioning," IEEE Trans. Wireless Commun., vol. 11, no. 2, pp. 790-799, Feb. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.2 , pp. 790-799
    • Chen, X.1    Zhang, Z.2    Chen, S.3    Wang, C.4
  • 186
    • 45249092485 scopus 로고    scopus 로고
    • Secure broadcasting over fading channels
    • Jun.
    • A. Khisti, A. Tchamkerten, and G. W. Wornell, "Secure broadcasting over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2453-2469, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2453-2469
    • Khisti, A.1    Tchamkerten, A.2    Wornell, G.W.3
  • 188
    • 84907525208 scopus 로고    scopus 로고
    • Secure multiuser communications in multiple amplify-and-forward relay networks
    • Sep.
    • L. Fan, X. Lei, T. Q. Duong, M. Elkashlan, and G. K. Karagiannidis, "Secure multiuser communications in multiple amplify-and-forward relay networks," IEEE Trans. Commun., vol. 62, no. 9, pp. 3299-3310, Sep. 2014.
    • (2014) IEEE Trans. Commun. , vol.62 , Issue.9 , pp. 3299-3310
    • Fan, L.1    Lei, X.2    Duong, T.Q.3    Elkashlan, M.4    Karagiannidis, G.K.5
  • 189
    • 77958520866 scopus 로고    scopus 로고
    • Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages
    • Nov.
    • H. D. Ly, T. Liu, and Y. Liang, "Multiple-input multiple-output Gaussian broadcast channels with common and confidential messages," IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5477-5487, Nov. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.56 , Issue.11 , pp. 5477-5487
    • Ly, H.D.1    Liu, T.2    Liang, Y.3
  • 190
    • 78649315054 scopus 로고    scopus 로고
    • Secure broadcasting using multiple antennas
    • Oct.
    • E. Ekrem and S. Ulukus, "Secure broadcasting using multiple antennas," J. Commun. Netw., vol. 12, no. 5, pp. 411-432, Oct. 2010.
    • (2010) J. Commun. Netw. , vol.12 , Issue.5 , pp. 411-432
    • Ekrem, E.1    Ulukus, S.2
  • 191
    • 79955497445 scopus 로고    scopus 로고
    • Interference alignment for the multiantenna compound wiretap channel
    • May
    • A. Khisti, "Interference alignment for the multiantenna compound wiretap channel," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2976-2993, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 2976-2993
    • Khisti, A.1
  • 192
    • 77949575243 scopus 로고    scopus 로고
    • Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels
    • Monticello, IL, USA, Sep./Oct.
    • A. Mukherjee and A. L. Swindlehurst, "Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels," in Proc. Allerton CCC, Monticello, IL, USA, Sep./Oct. 2009, pp. 1134-1141.
    • (2009) Proc. Allerton CCC , pp. 1134-1141
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 193
    • 85027407300 scopus 로고    scopus 로고
    • Mode selection in MU-MIMO downlink networks: A physical-layer security perspective
    • to be published
    • X. Chen and Y. Zhang, "Mode selection in MU-MIMO downlink networks: A physical-layer security perspective," IEEE Syst. J., to be published, doi: 10.1109/JSYST.2015.2413843.
    • IEEE Syst. J.
    • Chen, X.1    Zhang, Y.2
  • 194
    • 84880150823 scopus 로고    scopus 로고
    • Large system analysis of linear precoding in MISO broadcast channels with confidential messages
    • Sep.
    • G. Geraci, R. Couillet, J. Yuan, M. Debbah, and I. B. Collings, "Large system analysis of linear precoding in MISO broadcast channels with confidential messages," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1660-1671, Sep. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 1660-1671
    • Geraci, G.1    Couillet, R.2    Yuan, J.3    Debbah, M.4    Collings, I.B.5
  • 195
    • 84907220339 scopus 로고    scopus 로고
    • Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis
    • Sep.
    • J. Zhang, C. Yuen, C.-K. Wen, S. Jin, and X. Gao, "Ergodic secrecy sum-rate for multiuser downlink transmission via regularized channel inversion: Large system analysis," IEEE Commun. Lett., vol. 18, no. 9, pp. 1627-1630, Sep. 2014.
    • (2014) IEEE Commun. Lett. , vol.18 , Issue.9 , pp. 1627-1630
    • Zhang, J.1    Yuen, C.2    Wen, C.-K.3    Jin, S.4    Gao, X.5
  • 196
    • 84910151930 scopus 로고    scopus 로고
    • Physical layer security in multi-cell MISO downlinks with incomplete CSI-A unified secrecy performance analysis
    • Dec.
    • X. Chen and H.-H. Chen, "Physical layer security in multi-cell MISO downlinks with incomplete CSI-A unified secrecy performance analysis," IEEE Trans. Signal Process., vol. 62, no. 23, pp. 6286-6297, Dec. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.23 , pp. 6286-6297
    • Chen, X.1    Chen, H.-H.2
  • 197
    • 80855138617 scopus 로고    scopus 로고
    • Capacity analysis of a multi-cell multi-antenna cooperative cellular network with co-channel interference
    • Oct.
    • X. Ge, K. Huang, C.-X. Wang, X. Hong, and X. Yang, "Capacity analysis of a multi-cell multi-antenna cooperative cellular network with co-channel interference," IEEE Trans. Wireless Commun., vol. 10, no. 10, pp. 3298-3309, Oct. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.10 , pp. 3298-3309
    • Ge, X.1    Huang, K.2    Wang, C.-X.3    Hong, X.4    Yang, X.5
  • 198
    • 33750058305 scopus 로고    scopus 로고
    • Downlink beamforming algorithms with inter-cell interference in cellular networks
    • Oct.
    • T. Ren and R. J. La, "Downlink beamforming algorithms with inter-cell interference in cellular networks," IEEE Trans. Wireless Commun., vol. 5, no. 10, pp. 2814-2823, Oct. 2006.
    • (2006) IEEE Trans. Wireless Commun. , vol.5 , Issue.10 , pp. 2814-2823
    • Ren, T.1    La, R.J.2
  • 199
    • 78649738324 scopus 로고    scopus 로고
    • Multi-cell MIMO cooperative networks: A new look at interference
    • Dec.
    • D. Gesbert et al., "Multi-cell MIMO cooperative networks: A new look at interference," IEEE J. Sel. Areas Commun., vol. 28, no. 9, pp. 1380-1408, Dec. 2010.
    • (2010) IEEE J. Sel. Areas Commun. , vol.28 , Issue.9 , pp. 1380-1408
    • Gesbert, D.1
  • 201
    • 84907195591 scopus 로고    scopus 로고
    • Secure transmission in multicell massive MIMO systems
    • Sep.
    • J. Zhu, R. Schober, and V. K. Bhargava, "Secure transmission in multicell massive MIMO systems," IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4766-4781, Sep. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.9 , pp. 4766-4781
    • Zhu, J.1    Schober, R.2    Bhargava, V.K.3
  • 202
    • 84963567995 scopus 로고    scopus 로고
    • Linear precoding of data and artificial noise in secure massive MIMO systems
    • Mar.
    • J. Zhu, R. Schober, and V. K. Bhargava, "Linear precoding of data and artificial noise in secure massive MIMO systems," IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2245-2261, Mar. 2016.
    • (2016) IEEE Trans. Wireless Commun. , vol.15 , Issue.3 , pp. 2245-2261
    • Zhu, J.1    Schober, R.2    Bhargava, V.K.3
  • 203
    • 84969998525 scopus 로고    scopus 로고
    • Secure massive MIMO transmission with an active eavesdropper
    • Jul.
    • Y. Wu, R. Schober, D. W. K. Ng, C. Xiao, and G. Caire, "Secure massive MIMO transmission with an active eavesdropper," IEEE Trans. Inf. Theory, vol. 62, no. 7, pp. 3880-3900, Jul. 2016.
    • (2016) IEEE Trans. Inf. Theory , vol.62 , Issue.7 , pp. 3880-3900
    • Wu, Y.1    Schober, R.2    Ng, D.W.K.3    Xiao, C.4    Caire, G.5
  • 204
    • 80054827541 scopus 로고    scopus 로고
    • The secrecy capacity region of a special class of multiple access channels
    • St. Petersburg, Russia, Jul./Aug.
    • N. Liu and W. Kang, "The secrecy capacity region of a special class of multiple access channels," in Proc. IEEE ISIT, St. Petersburg, Russia, Jul./Aug. 2011, pp. 623-627.
    • (2011) Proc. IEEE ISIT , pp. 623-627
    • Liu, N.1    Kang, W.2
  • 205
    • 84921471912 scopus 로고    scopus 로고
    • On secure communication over multiple access wiretap channels under channel uncertainty
    • San Francisco, CA, USA, Oct.
    • R. F. Schaefer and H. V. Poor, "On secure communication over multiple access wiretap channels under channel uncertainty," in Proc. IEEE CNS, San Francisco, CA, USA, Oct. 2014, pp. 109-114.
    • (2014) Proc. IEEE CNS , pp. 109-114
    • Schaefer, R.F.1    Poor, H.V.2
  • 206
    • 84890353615 scopus 로고    scopus 로고
    • Secure degrees of freedom of the Gaussian multiple access wiretap channel
    • Istanbul, Turkey, Jul.
    • J. Xie and S. Ulukus, "Secure degrees of freedom of the Gaussian multiple access wiretap channel," in Proc. IEEE ISIT, Istanbul, Turkey, Jul. 2013, pp. 1337-1341.
    • (2013) Proc. IEEE ISIT , pp. 1337-1341
    • Xie, J.1    Ulukus, S.2
  • 207
    • 84897894009 scopus 로고    scopus 로고
    • Performance analysis and optimization for interference alignment over MIMO interference channels with limited feedback
    • Apr.
    • X. Chen and C. Yuen, "Performance analysis and optimization for interference alignment over MIMO interference channels with limited feedback," IEEE Trans. Signal Process., vol. 62, no. 7, pp. 1785-1795, Apr. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.7 , pp. 1785-1795
    • Chen, X.1    Yuen, C.2
  • 208
    • 79955506113 scopus 로고    scopus 로고
    • Feasibility condition for interference alignment with diversity
    • May
    • H. Ning, C. Ling, and K. K. Leung, "Feasibility condition for interference alignment with diversity," IEEE Trans. Inf. Theory, vol. 57, no. 5, pp. 2902-2912, May 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.5 , pp. 2902-2912
    • Ning, H.1    Ling, C.2    Leung, K.K.3
  • 210
    • 84928563686 scopus 로고    scopus 로고
    • Secure degrees of freedom of K-user Gaussian interference channels: A unified view
    • May
    • J. Xie and S. Ulukus, "Secure degrees of freedom of K-user Gaussian interference channels: A unified view," IEEE Trans. Inf. Theory, vol. 61, no. 5, pp. 2647-2661, May 2015.
    • (2015) IEEE Trans. Inf. Theory , vol.61 , Issue.5 , pp. 2647-2661
    • Xie, J.1    Ulukus, S.2
  • 211
    • 84875720845 scopus 로고    scopus 로고
    • The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise
    • Monticello, IL, USA, Oct.
    • X. He and A. Yener, "The interference wiretap channel with an arbitrarily varying eavesdropper: Aligning interference with artificial noise," in Proc. Allerton Conf., Monticello, IL, USA, Oct. 2012, pp. 204-211.
    • (2012) Proc. Allerton Conf. , pp. 204-211
    • He, X.1    Yener, A.2
  • 212
    • 84883278751 scopus 로고    scopus 로고
    • Robust coordinated beamforming for secure MISO interference channels with bounded ellipsoidal uncertainties
    • Aug.
    • J. Ni et al., "Robust coordinated beamforming for secure MISO interference channels with bounded ellipsoidal uncertainties," IEEE Wireless Commun. Lett., vol. 2, no. 4, pp. 407-410, Aug. 2013.
    • (2013) IEEE Wireless Commun. Lett. , vol.2 , Issue.4 , pp. 407-410
    • Ni, J.1
  • 213
    • 13844296408 scopus 로고    scopus 로고
    • Cognitive radio: Brain-empowered wireless communications
    • Feb.
    • S. Haykin, "Cognitive radio: Brain-empowered wireless communications," IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201-220, Feb. 2005.
    • (2005) IEEE J. Sel. Areas Commun. , vol.23 , Issue.2 , pp. 201-220
    • Haykin, S.1
  • 214
    • 85032751060 scopus 로고    scopus 로고
    • A Survey of dynamic spectrum access
    • May
    • Q. Zhao and B. M. Sadler, "A Survey of dynamic spectrum access," IEEE Signal Process. Mag., vol. 24, no. 3, pp. 79-89, May 2007.
    • (2007) IEEE Signal Process. Mag. , vol.24 , Issue.3 , pp. 79-89
    • Zhao, Q.1    Sadler, B.M.2
  • 215
    • 84906782754 scopus 로고    scopus 로고
    • Cooperative communications for cognitive radio networks-From theory to application
    • 3rd Quart.
    • X. Chen, H.-H. Chen, and W. Meng, "Cooperative communications for cognitive radio networks-From theory to application," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1180-1193, 3rd Quart., 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.3 , pp. 1180-1193
    • Chen, X.1    Chen, H.-H.2    Meng, W.3
  • 216
    • 84865388936 scopus 로고    scopus 로고
    • Toward secure cognitive communications in wireless networks
    • Aug.
    • T. Jiang, T. Li, and J. Ren, "Toward secure cognitive communications in wireless networks," IEEE Wireless Commun., vol. 19, no. 4, pp. 82-88, Aug. 2012.
    • (2012) IEEE Wireless Commun. , vol.19 , Issue.4 , pp. 82-88
    • Jiang, T.1    Li, T.2    Ren, J.3
  • 217
    • 84976477515 scopus 로고    scopus 로고
    • Robust beamforming and power splitting for secrecy wireless information and power transfer in cognitive relay networks
    • Jun.
    • Y. Wu and X. Chen, "Robust beamforming and power splitting for secrecy wireless information and power transfer in cognitive relay networks," IEEE Commun. Lett., vol. 20, no. 6, pp. 1152-1155, Jun. 2016.
    • (2016) IEEE Commun. Lett. , vol.20 , Issue.6 , pp. 1152-1155
    • Wu, Y.1    Chen, X.2
  • 218
    • 84891743872 scopus 로고    scopus 로고
    • Physical-layer security with multiuser scheduling in cognitive radio networks
    • Dec.
    • Y. Zou, X. Wang, and W. Shen, "Physical-layer security with multiuser scheduling in cognitive radio networks," IEEE Trans. Commun., vol. 61, no. 12, pp. 5103-5113, Dec. 2013.
    • (2013) IEEE Trans. Commun. , vol.61 , Issue.12 , pp. 5103-5113
    • Zou, Y.1    Wang, X.2    Shen, W.3
  • 219
    • 84928124775 scopus 로고    scopus 로고
    • A survey of security issues in cognitive radio networks
    • Mar.
    • J. Li, Z. Feng, Z. Feng, and P. Zhang, "A survey of security issues in cognitive radio networks," China Commun., vol. 12, no. 3, pp. 132-150, Mar. 2015.
    • (2015) China Commun. , vol.12 , Issue.3 , pp. 132-150
    • Li, J.1    Feng, Z.2    Feng, Z.3    Zhang, P.4
  • 220
    • 84873711287 scopus 로고    scopus 로고
    • A survey on security threats and detection techniques in cognitive radio networks
    • 1st Quart.
    • A. G. Fragkiadakis, E. Z. Tragos, and I. G. Askoxylakis, "A survey on security threats and detection techniques in cognitive radio networks," IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 428-445, 1st Quart., 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.1 , pp. 428-445
    • Fragkiadakis, A.G.1    Tragos, E.Z.2    Askoxylakis, I.G.3
  • 221
    • 84879072350 scopus 로고    scopus 로고
    • On physical layer security for cognitive radio networks
    • May/Jun.
    • Z. Shu, Y. Qian, and S. Ci, "On physical layer security for cognitive radio networks," IEEE Netw., vol. 27, no. 3, pp. 28-33, May/Jun. 2013.
    • (2013) IEEE Netw. , vol.27 , Issue.3 , pp. 28-33
    • Shu, Z.1    Qian, Y.2    Ci, S.3
  • 222
    • 84949921990 scopus 로고    scopus 로고
    • Secure degrees of freedom in MIMO cognitive radio systems
    • Austin, TX, USA, Dec.
    • H. Mu and J. K. Tugnait, "Secure degrees of freedom in MIMO cognitive radio systems," in Proc. IEEE GLOBECOM, Austin, TX, USA, Dec. 2014, pp. 1011-1016.
    • (2014) Proc. IEEE GLOBECOM , pp. 1011-1016
    • Mu, H.1    Tugnait, J.K.2
  • 223
    • 84890056190 scopus 로고    scopus 로고
    • Physical layer security in cognitive radio networks: A beamforming approach
    • Batumi, Georgia, Jul.
    • O. Cepheli and G. K. Kurt, "Physical layer security in cognitive radio networks: A beamforming approach," in Proc. BlackSeaCom, Batumi, Georgia, Jul. 2013, pp. 233-237.
    • (2013) Proc. BlackSeaCom , pp. 233-237
    • Cepheli, O.1    Kurt, G.K.2
  • 224
    • 84877644812 scopus 로고    scopus 로고
    • Secure MISO cognitive radio system with perfect and imperfect CSI
    • Anaheim, CA, USA, Dec.
    • T. Kwon, V. W. S. Wong, and R. Schober, "Secure MISO cognitive radio system with perfect and imperfect CSI," in Proc. IEEE GLOBECOM, Anaheim, CA, USA, Dec. 2012, pp. 1236-1241.
    • (2012) Proc. IEEE GLOBECOM , pp. 1236-1241
    • Kwon, T.1    Wong, V.W.S.2    Schober, R.3
  • 225
    • 77952860702 scopus 로고    scopus 로고
    • Achieving cognitive and secure transmissions using multiple antennas
    • Tokyo, Japan, Sep.
    • Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Achieving cognitive and secure transmissions using multiple antennas," in Proc. IEEE PIMRC, Tokyo, Japan, Sep. 2009, pp. 1-5.
    • (2009) Proc. IEEE PIMRC , pp. 1-5
    • Pei, Y.1    Liang, Y.-C.2    Zhang, L.3    Teh, K.C.4    Li, K.H.5
  • 226
    • 77951274829 scopus 로고    scopus 로고
    • Secure communication over MISO cognitive radio channels
    • Apr.
    • Y. Pei, Y.-C. Liang, L. Zhang, K. C. Teh, and K. H. Li, "Secure communication over MISO cognitive radio channels," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1494-1502, Apr. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.4 , pp. 1494-1502
    • Pei, Y.1    Liang, Y.-C.2    Zhang, L.3    Teh, K.C.4    Li, K.H.5
  • 227
    • 79952680469 scopus 로고    scopus 로고
    • Secure communication in multiantenna cognitive radio networks with imperfect channel state information
    • Apr.
    • Y. Pei, Y.-C. Liang, K. C. Teh, and K. H. Li, "Secure communication in multiantenna cognitive radio networks with imperfect channel state information," IEEE Trans. Signal Process., vol. 59, no. 4, pp. 1683-1693, Apr. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.4 , pp. 1683-1693
    • Pei, Y.1    Liang, Y.-C.2    Teh, K.C.3    Li, K.H.4
  • 228
    • 84969940810 scopus 로고    scopus 로고
    • Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer
    • May
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Multiobjective resource allocation for secure communication in cognitive radio networks with wireless information and power transfer," IEEE Trans. Veh. Technol., vol. 65, no. 5, pp. 3166-3184, May 2016.
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.5 , pp. 3166-3184
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 230
    • 84973402072 scopus 로고    scopus 로고
    • Energy efficient beamforming for secure communication in cognitive radio networks
    • Shanghai, China, Mar.
    • J. Ouyang, M. Lin, W.-P. Zhu, D. Massicotte, and A. L. Swindlehurst, "Energy efficient beamforming for secure communication in cognitive radio networks," in Proc. IEEE ICASSP, Shanghai, China, Mar. 2016, pp. 3496-3500.
    • (2016) Proc. IEEE ICASSP , pp. 3496-3500
    • Ouyang, J.1    Lin, M.2    Zhu, W.-P.3    Massicotte, D.4    Swindlehurst, A.L.5
  • 231
    • 84886699027 scopus 로고    scopus 로고
    • Security-oriented transmission based on cooperative relays in cognitive radio
    • Aug.
    • W. Li, M. Xin, M. Yue, T. Yinglei, and Z. Yong, "Security-oriented transmission based on cooperative relays in cognitive radio," China Commun., vol. 10, no. 8, pp. 27-35, Aug. 2013.
    • (2013) China Commun. , vol.10 , Issue.8 , pp. 27-35
    • Li, W.1    Xin, M.2    Yue, M.3    Yinglei, T.4    Yong, Z.5
  • 232
    • 84923867468 scopus 로고    scopus 로고
    • Relay selection for security enhancement in cognitive relay networks
    • Feb.
    • Y. Liu, L. Wang, T. T. Duy, M. Elkashlan, and T. Q. Duong, "Relay selection for security enhancement in cognitive relay networks," IEEE Wireless Commun. Lett., vol. 4, no. 1, pp. 46-49, Feb. 2015.
    • (2015) IEEE Wireless Commun. Lett. , vol.4 , Issue.1 , pp. 46-49
    • Liu, Y.1    Wang, L.2    Duy, T.T.3    Elkashlan, M.4    Duong, T.Q.5
  • 233
    • 84921348505 scopus 로고    scopus 로고
    • Relay-selection improves the security-reliability trade-off in cognitive radio systems
    • Jan.
    • Y. Zou, B. Champagne, W.-P. Zhu, and L. Hanzo, "Relay-selection improves the security-reliability trade-off in cognitive radio systems," IEEE Trans. Commun., vol. 63, no. 1, pp. 215-228, Jan. 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.1 , pp. 215-228
    • Zou, Y.1    Champagne, B.2    Zhu, W.-P.3    Hanzo, L.4
  • 234
    • 84878659299 scopus 로고    scopus 로고
    • MIMO broadcasting for simultaneous wireless information and power transfer
    • May
    • R. Zhang and C. K. Ho, "MIMO broadcasting for simultaneous wireless information and power transfer," IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 1989-2001, May 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.5 , pp. 1989-2001
    • Zhang, R.1    Ho, C.K.2
  • 235
    • 84888093326 scopus 로고    scopus 로고
    • Simultaneous information and power transfer for broadband wireless systems
    • Dec.
    • K. Huang and E. Larsson, "Simultaneous information and power transfer for broadband wireless systems," IEEE Trans. Signal Process., vol. 61, no. 23, pp. 5972-5986, Dec. 2013.
    • (2013) IEEE Trans. Signal Process. , vol.61 , Issue.23 , pp. 5972-5986
    • Huang, K.1    Larsson, E.2
  • 236
    • 84893341917 scopus 로고    scopus 로고
    • Wireless energy and information transfer tradeoff for limited-feedback multiantenna systems with energy beamforming
    • Jan.
    • X. Chen, C. Yuen, and Z. Zhang, "Wireless energy and information transfer tradeoff for limited-feedback multiantenna systems with energy beamforming," IEEE Trans. Veh. Technol., vol. 63, no. 1, pp. 407-412, Jan. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.1 , pp. 407-412
    • Chen, X.1    Yuen, C.2    Zhang, Z.3
  • 237
    • 84891558256 scopus 로고    scopus 로고
    • Wireless information and power transfer: Energy efficiency optimization in OFDMA systems
    • Dec.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Wireless information and power transfer: Energy efficiency optimization in OFDMA systems," IEEE Trans. Wireless Commun., vol. 12, no. 12, pp. 6352-6370, Dec. 2013.
    • (2013) IEEE Trans. Wireless Commun. , vol.12 , Issue.12 , pp. 6352-6370
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 238
    • 84927658290 scopus 로고    scopus 로고
    • Wireless networks with RF energy harvesting: A contemporary survey
    • 2nd Quart.
    • X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, "Wireless networks with RF energy harvesting: A contemporary survey," IEEE Commun. Surveys Tuts., vol. 17, no. 2, pp. 757-789, 2nd Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.2 , pp. 757-789
    • Lu, X.1    Wang, P.2    Niyato, D.3    Kim, D.I.4    Han, Z.5
  • 239
    • 84927636500 scopus 로고    scopus 로고
    • Wireless powered communication: Opportunities and challenges
    • Apr.
    • S. Bi, C. K. Ho, and R. Zhang, "Wireless powered communication: Opportunities and challenges," IEEE Commun. Mag., vol. 53, no. 4, pp. 117-125, Apr. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.4 , pp. 117-125
    • Bi, S.1    Ho, C.K.2    Zhang, R.3
  • 240
    • 84968867653 scopus 로고    scopus 로고
    • Secrecy wireless information and power transfer: Challenges and opportunities
    • Apr.
    • X. Chen, D. W. K. Ng, and H.-H. Chen, "Secrecy wireless information and power transfer: Challenges and opportunities," IEEE Wireless Commun., vol. 23, no. 2, pp. 54-61, Apr. 2016.
    • (2016) IEEE Wireless Commun. , vol.23 , Issue.2 , pp. 54-61
    • Chen, X.1    Ng, D.W.K.2    Chen, H.-H.3
  • 241
    • 85013176736 scopus 로고    scopus 로고
    • Robust resource allocation for secrecy wireless powered communication networks
    • to be published
    • Y. Wu, X. Chen, C. Yuen, and C. Zhong, "Robust resource allocation for secrecy wireless powered communication networks," IEEE Commun. Lett., to be published, doi: 10.1109/LCOMM.2016.2598327.
    • IEEE Commun. Lett.
    • Wu, Y.1    Chen, X.2    Yuen, C.3    Zhong, C.4
  • 242
    • 84988584736 scopus 로고    scopus 로고
    • Secrecy performance of wirelessly powered wiretap channels
    • Sep.
    • X. Jiang et al., "Secrecy performance of wirelessly powered wiretap channels," IEEE Trans. Commun., vol. 64, no. 9, pp. 3858-3871, Sep. 2016.
    • (2016) IEEE Trans. Commun. , vol.64 , Issue.9 , pp. 3858-3871
    • Jiang, X.1
  • 243
    • 84927617729 scopus 로고    scopus 로고
    • Enhancing wireless information and power transfer by exploiting multi-antenna techniques
    • Apr.
    • X. Chen, Z. Zhang, H.-H. Chen, and H. Zhang, "Enhancing wireless information and power transfer by exploiting multi-antenna techniques," IEEE Commun. Mag., vol. 53, no. 4, pp. 133-141, Apr. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.4 , pp. 133-141
    • Chen, X.1    Zhang, Z.2    Chen, H.-H.3    Zhang, H.4
  • 244
    • 84927596040 scopus 로고    scopus 로고
    • Application of smart antenna technologies in simultaneous wireless information and power transfer
    • Apr.
    • Z. Ding et al., "Application of smart antenna technologies in simultaneous wireless information and power transfer," IEEE Commun. Mag., vol. 53, no. 4, pp. 86-93, Apr. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.4 , pp. 86-93
    • Ding, Z.1
  • 245
    • 84903595688 scopus 로고    scopus 로고
    • Robust beamforming for secure communication in systems with wireless information and power transfer
    • Aug.
    • D. W. K. Ng, E. S. Lo, and R. Schober, "Robust beamforming for secure communication in systems with wireless information and power transfer," IEEE Trans. Wireless Commun., vol. 13, no. 8, pp. 4599-4615, Aug. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.8 , pp. 4599-4615
    • Ng, D.W.K.1    Lo, E.S.2    Schober, R.3
  • 246
    • 84947815873 scopus 로고    scopus 로고
    • Achievable ergodic secrecy rate for MIMO SWIPT wiretap channels
    • London, U.K., Jun.
    • J. Zhang et al., "Achievable ergodic secrecy rate for MIMO SWIPT wiretap channels," in Proc. IEEE ICC, London, U.K., Jun. 2015, pp. 453-458.
    • (2015) Proc. IEEE ICC , pp. 453-458
    • Zhang, J.1
  • 247
    • 84941722281 scopus 로고    scopus 로고
    • Secure and green SWIPT in distributed antenna networks with limited backhaul capacity
    • Sep.
    • D. W. K. Ng and R. Schober, "Secure and green SWIPT in distributed antenna networks with limited backhaul capacity," IEEE Trans. Wireless Commun., vol. 14, no. 9, pp. 5082-5097, Sep. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.9 , pp. 5082-5097
    • Ng, D.W.K.1    Schober, R.2
  • 248
    • 84929378752 scopus 로고    scopus 로고
    • Secure beamforming for MIMO broadcasting with wireless information and power transfer
    • May
    • Q. Shi, W. Xu, J. Wu, E. Song, and Y, Wang, "Secure beamforming for MIMO broadcasting with wireless information and power transfer," IEEE Trans. Wireless Commun., vol. 14, no. 5, pp. 2841-2853, May 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.5 , pp. 2841-2853
    • Shi, Q.1    Xu, W.2    Wu, J.3    Song, E.4    Wang, Y.5
  • 249
    • 84921407537 scopus 로고    scopus 로고
    • Robust secure transmission in MISO simultaneous wireless information and power transfer system
    • Jan.
    • R. Feng, Q. Li, Q. Zhang, and J. Qin, "Robust secure transmission in MISO simultaneous wireless information and power transfer system," IEEE Trans. Veh. Technol., vol. 64, no. 1, pp. 400-405, Jan. 2015.
    • (2015) IEEE Trans. Veh. Technol. , vol.64 , Issue.1 , pp. 400-405
    • Feng, R.1    Li, Q.2    Zhang, Q.3    Qin, J.4
  • 250
    • 84912101765 scopus 로고    scopus 로고
    • Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer
    • Jun.
    • M. Tian, X. Huang, Q. Zhang, and J. Qin, "Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer," IEEE Signal Process. Lett., vol. 22, no. 6, pp. 723-727, Jun. 2015.
    • (2015) IEEE Signal Process. Lett. , vol.22 , Issue.6 , pp. 723-727
    • Tian, M.1    Huang, X.2    Zhang, Q.3    Qin, J.4
  • 251
    • 84897823215 scopus 로고    scopus 로고
    • Secrecy wireless information and power transfer with MISO beamforming
    • Apr.
    • L. Liu, R. Zhang, and K.-C. Chua, "Secrecy wireless information and power transfer with MISO beamforming," IEEE Trans. Signal Process., vol. 62, no. 7, pp. 1850-1863, Apr. 2014.
    • (2014) IEEE Trans. Signal Process. , vol.62 , Issue.7 , pp. 1850-1863
    • Liu, L.1    Zhang, R.2    Chua, K.-C.3
  • 252
    • 84925257868 scopus 로고    scopus 로고
    • Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels
    • Mar.
    • Q. Zhang, X. Huang, Q. Li, and J. Qin, "Cooperative jamming aided robust secure transmission for wireless information and power transfer in MISO channels," IEEE Trans. Commun., vol. 63, no. 3, pp. 906-915, Mar. 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.3 , pp. 906-915
    • Zhang, Q.1    Huang, X.2    Li, Q.3    Qin, J.4
  • 253
    • 84902959511 scopus 로고    scopus 로고
    • Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks
    • Jun.
    • Q. Li, Q. Zhang, and J. Qin, "Secure relay beamforming for simultaneous wireless information and power transfer in nonregenerative relay networks," IEEE Trans. Veh. Technol., vol. 63, no. 5, pp. 2462-2467, Jun. 2014.
    • (2014) IEEE Trans. Veh. Technol. , vol.63 , Issue.5 , pp. 2462-2467
    • Li, Q.1    Zhang, Q.2    Qin, J.3
  • 254
    • 85009131916 scopus 로고    scopus 로고
    • Secure transmission in wireless powered massive MIMO relaying systems: Performance analysis and optimization
    • Oct.
    • X. Chen, J. Chen, and T. Liu, "Secure transmission in wireless powered massive MIMO relaying systems: Performance analysis and optimization," IEEE Trans. Veh. Technol., vol. 65, no. 10, pp. 8025-8035, Oct. 2016.
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.10 , pp. 8025-8035
    • Chen, X.1    Chen, J.2    Liu, T.3
  • 255
    • 84975755413 scopus 로고    scopus 로고
    • Energy-efficient power allocation for secure communications in wireless powered massive MIMO relaying systems
    • Nanjing, China, Oct.
    • C. Du, X. Chen, and L. Lei, "Energy-efficient power allocation for secure communications in wireless powered massive MIMO relaying systems," in Proc. WCSP, Nanjing, China, Oct. 2015, pp. 1-6.
    • (2015) Proc. WCSP , pp. 1-6
    • Du, C.1    Chen, X.2    Lei, L.3
  • 256
    • 72949120015 scopus 로고    scopus 로고
    • Deviceto-device communication as an underlay to LTE-advanced networks
    • Dec.
    • K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, "Deviceto-device communication as an underlay to LTE-advanced networks," IEEE Commun. Mag., vol. 47, no. 12, pp. 42-49, Dec. 2009.
    • (2009) IEEE Commun. Mag. , vol.47 , Issue.12 , pp. 42-49
    • Doppler, K.1    Rinne, M.2    Wijting, C.3    Ribeiro, C.B.4    Hugl, K.5
  • 257
    • 84964802947 scopus 로고    scopus 로고
    • Joint spectrum and power allocation for D2D communications underlaying cellular networks
    • Apr.
    • R. Yin et al., "Joint spectrum and power allocation for D2D communications underlaying cellular networks," IEEE Trans. Veh. Technol., vol. 65, no. 4, pp. 2182-2195, Apr. 2016.
    • (2016) IEEE Trans. Veh. Technol. , vol.65 , Issue.4 , pp. 2182-2195
    • Yin, R.1
  • 258
    • 84903143070 scopus 로고    scopus 로고
    • Cooperative interference cancellation using device-to-device communications
    • Jun.
    • R. Tanbourgi, H. Jäkel, and F. K. Jondral, "Cooperative interference cancellation using device-to-device communications," IEEE Commun. Mag., vol. 52, no. 6, pp. 118-124, Jun. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.6 , pp. 118-124
    • Tanbourgi, R.1    Jäkel, H.2    Jondral, F.K.3
  • 259
    • 84924867341 scopus 로고    scopus 로고
    • Pricing-based interference coordination for D2D communications in cellular networks
    • Mar.
    • R. Yin, G. Yu, H. Zhang, Z. Zhang, and G. Y. Li, "Pricing-based interference coordination for D2D communications in cellular networks," IEEE Trans. Wireless Commun., vol. 14, no. 3, pp. 1519-1532, Mar. 2015.
    • (2015) IEEE Trans. Wireless Commun. , vol.14 , Issue.3 , pp. 1519-1532
    • Yin, R.1    Yu, G.2    Zhang, H.3    Zhang, Z.4    Li, G.Y.5
  • 260
    • 84900387940 scopus 로고    scopus 로고
    • Secure device-to-device communication in LTE-A
    • Apr.
    • M. Alam, D. Yang, J. Rodriguez, and R. A. Abd-Alhameed, "Secure device-to-device communication in LTE-A," IEEE Commun. Mag., vol. 52, no. 4, pp. 66-73, Apr. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.4 , pp. 66-73
    • Alam, M.1    Yang, D.2    Rodriguez, J.3    Abd-Alhameed, R.A.4
  • 261
    • 84929441108 scopus 로고    scopus 로고
    • Secure communications with D2D cooperation
    • Sharjah, UAE, Feb.
    • S. A. M. Ghanem and M. Ara, "Secure communications with D2D cooperation," in Proc. IEEE ICCSPA, Sharjah, UAE, Feb. 2015, pp. 1-6.
    • (2015) Proc. IEEE ICCSPA , pp. 1-6
    • Ghanem, S.A.M.1    Ara, M.2
  • 262
    • 85013032134 scopus 로고    scopus 로고
    • Secrecy-optimized resource allocation for device-to-device communication underlaying heterogeneous networks
    • to be published
    • K. Zhang, M. Peng, P. Zhang, and X. Li, "Secrecy-optimized resource allocation for device-to-device communication underlaying heterogeneous networks," IEEE Trans. Veh. Technol., to be published, doi: 10.1109/TVT.2016.2566298.
    • IEEE Trans. Veh. Technol.
    • Zhang, K.1    Peng, M.2    Zhang, P.3    Li, X.4
  • 263
    • 84890430700 scopus 로고    scopus 로고
    • Secrecy-based access control for device-to-device communication underlaying cellular networks
    • Nov.
    • J. Yue, C. Ma, H. Yu, and W. Zhou, "Secrecy-based access control for device-to-device communication underlaying cellular networks," IEEE Commun. Lett., vol. 17, no. 11, pp. 2068-2071, Nov. 2013.
    • (2013) IEEE Commun. Lett. , vol.17 , Issue.11 , pp. 2068-2071
    • Yue, J.1    Ma, C.2    Yu, H.3    Zhou, W.4
  • 264
    • 84921323282 scopus 로고    scopus 로고
    • Interference exploitation in D2D-enabled cellular networks: A secrecy perspective
    • Jan.
    • C. Ma et al., "Interference exploitation in D2D-enabled cellular networks: A secrecy perspective," IEEE Trans. Commun., vol. 63, no. 1, pp. 229-242, Jan. 2015.
    • (2015) IEEE Trans. Commun. , vol.63 , Issue.1 , pp. 229-242
    • Ma, C.1
  • 265
    • 84923299449 scopus 로고    scopus 로고
    • Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with deviceto-device communications
    • Feb.
    • Z. Chu, K. Cumanan, M. Xu, and Z. Ding, "Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with deviceto-device communications," IET Commun., vol. 9, no. 3, pp. 396-403, Feb. 2015.
    • (2015) IET Commun. , vol.9 , Issue.3 , pp. 396-403
    • Chu, Z.1    Cumanan, K.2    Xu, M.3    Ding, Z.4
  • 266
    • 84925881945 scopus 로고    scopus 로고
    • PHY-layer resiliency in OFDM communications: A tutorial
    • 1st Quart.
    • C. Shahriar et al., "PHY-layer resiliency in OFDM communications: A tutorial," IEEE Commun. Surveys Tuts., vol. 17, no. 1, pp. 292-314, 1st Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.1 , pp. 292-314
    • Shahriar, C.1
  • 267
    • 80055109229 scopus 로고    scopus 로고
    • Research on secrecy capacity oriented relay selection for mobile cooperative networks
    • Beijing, China, Sep.
    • L. Wang, T. Ke, M. Song, Y. Wei, and Y. Teng, "Research on secrecy capacity oriented relay selection for mobile cooperative networks," in Proc. IEEE CCIS, Beijing, China, Sep. 2011, pp. 443-447.
    • (2011) Proc. IEEE CCIS , pp. 443-447
    • Wang, L.1    Ke, T.2    Song, M.3    Wei, Y.4    Teng, Y.5
  • 268
    • 84979824607 scopus 로고    scopus 로고
    • A survey on wireless security: Technical challenges, recent advances, and future trends
    • Sep.
    • Y. Zou, J. Zhu, X. Wang, and L. Hanzo, "A survey on wireless security: Technical challenges, recent advances, and future trends," Proc. IEEE, vol. 104, no. 9, pp. 1727-1765, Sep. 2016.
    • (2016) Proc. IEEE , vol.104 , Issue.9 , pp. 1727-1765
    • Zou, Y.1    Zhu, J.2    Wang, X.3    Hanzo, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.