[1] |
GOEL S , NEGI R . Guaranteeing secrecy using artificial noise[J]. IEEE Transactions on Wireless Communications, 2008,7(6): 2180-2189.
|
[2] |
康小磊, 季新生, 黄开枝 . 基于人工噪声辅助的D2D异构蜂窝安全通信方法[J]. 通信学报, 2015,36(10): 149-156.
|
|
KANG X L , JI X S , HUANG K Z . Secure D2D heterogeneous cellular communication based on artificial noise assisted[J]. Journal on Communications, 2015,36(10): 149-156.
|
[3] |
KHISTI A , WORNEL G W . Secure transmission with multiple antennas—part I:the MISOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010,56(7): 3088-3104.
|
[4] |
LI J Y , PETROPULU A P . On ergodic secrecy rate for Gaussian MISO wiretap channels[J]. IEEE Transactions onWireless Communications, 2011,10(4): 1176-1187.
|
[5] |
WANG H M , ZHENG T , MU P . Secure MISO wiretap channels with multi-antenna passive eavesdropper via artificial fast fading[J]. IEEE Transactions on Wireless Communications, 2014,14(1): 5396-5401.
|
[6] |
KHISTI A , WORNELL G W . Secure transmission with multiple antennas—part II:The MIMOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010,56(11): 5515-5532.
|
[7] |
LI N , TAO X F , XU J . Ergodic secrecy sum-rate for downlink multiuser MIMO systems with limited CSI feedback[J]. IEEE Communications Letters, 2014,18(6): 969-972.
|
[8] |
DONG L , HAN Z , PETROPULU A P ,et al. Improving wireless physical layer security via cooperating relays[J]. IEEE Transactions on Signal Processing, 2010,58(3): 1875-1888.
|
[9] |
WANG C , WANG H M , XIA X G ,et al. Uncoordinated jammer selection for securing SIMOME wiretap channels:a stochastic geometry approach[J]. IEEE Transactions on Wireless Communications, 2015,14(5): 2596-2612.
|
[10] |
LI W , GHOGHO M , CHEN B ,et al. Secure communication via sending artificial noise by the receiver:outage secrecy capacity/ region analysis[J]. IEEE Communications Letters, 2012,16(10): 1628-1631.
|
[11] |
ZHOU Y , ZHU Y , LI F ,et al. Securing communication via transmission of artificial noise by both sides:bipolar-beamforming optimization[J]. Mathematical Problems in Engineering, 2013,18(5): 708-716.
|
[12] |
ZHOU Y , XIANG Z Z , ZHU Y ,et al. Application of full-duplex wireless technique into secure MIMO communication:achievable secrecy rate based optimization[J]. IEEE Signal Processing Letters, 2014,21(7): 804-808.
|
[13] |
ZHENG G , KRIKIDIS I , LI J ,et al. Improving physical layer secrecy using full-duplex jamming receivers[J]. IEEE Transactions on Signal Process, 2013,61(20): 4962-4974.
|