[1] |
FOROOZANFARD E , FRANEK O , TATOMIRESCU A ,et al. Full-duplex MIMO system based on antenna cancellation technique[J]. Electronics Letters, 2014,50(16): 1116-1117.
|
[2] |
KIM D , LEE H , HONG D . A survey of in-band full-duplex transmission:from the perspective of PHY and MAC layers[J]. IEEE Communications Surveys & Tutorials, 2017,17(4): 2017-2046.
|
[3] |
LE A , TRAN L , HUANG X . Cyclostationary analysis of analog least mean square loop for self-interference cancellation in in-band full-duplex systems[J]. IEEE Communications Letters, 2017,21(12): 2738-2741.
|
[4] |
SABHARWAL A , SCHNITER P , GUO D ,et al. In-band full-duplex wireless:challenges and opportunities[J]. IEEE Journal on Selected Areas in Communications, 2014,32(9): 1637-1652.
|
[5] |
LEUNG Y C S K , HELLMAN M E . The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978,24(4): 451-456.
|
[6] |
LIANG Y , POOR H V , SHAMAI S . Secure communication over fading channels[J]. IEEE Transactions on Information Theory, 2008,54(6): 2470-2492.
|
[7] |
KHANDANI A K , . Two-way (true full-duplex) wireless[C]// 2013 13th Canadian Workshop on Information Theory. Piscataway:IEEE Press, 2013: 33-38.
|
[8] |
ZHOU Y , ZHU Y , XUE Z . Enhanced MIMOME wiretap channel via adopting full-duplex MIMO radios[C]// 2014 IEEE Global Communications Conference. Piscataway:IEEE Press, 2014: 3320-3325.
|
[9] |
KIM J , KIM J , LEE J ,et al. Physical-layer security against smart eavesdroppers:exploiting full-duplex receivers[J]. IEEE Access, 2018,6: 32945-32957.
|
[10] |
WAN Y , LI Q , ZHANG Q ,et al. Optimal and suboptimal full-duplex secure beamforming designs for MISO two-way communications[J]. IEEE Wireless Communications Letters, 2015,4(5): 493-496.
|
[11] |
QI C , CHEN Y , VINCK A J H ,et al. One-sided secrecy over the two-way wiretap channel[C]// 2016 International Symposium on Information Theory and Its Applications. Piscataway:IEEE Press, 2016: 626-630.
|
[12] |
冀保峰, 杨佳, 王一丹 ,等. 基于能效最优准则的双跳中继网络功率分配算法[J]. 通信学报, 2016,37(7): 124-131.
|
|
JI B F , YANG J , WANG Y D ,et al. Power allocation algorithms in two-hop relaying networks based on optimal energy efficiency[J]. Journal on Communications, 2016,37(7): 124-131.
|
[13] |
CHEN G , GONG Y , XIAO P ,et al. Physical layer network security in the full-duplex relay system[J]. IEEE Transactions on Information Forensics and Security, 2015,10(3): 574-583.
|
[14] |
CAO Y , ZHAO N , PAN G ,et al. Secrecy analysis for cooperative NOMA networks with multi-antenna full-duplex relay[J]. IEEE Transactions on Communications, 2019,67(8): 5574-5587.
|
[15] |
FENG R , LI Q , ZHANG Q ,et al. Robust secure beamforming in MISO full-duplex two-way secure communications[J]. IEEE Transactions on Vehicular Technology, 2016,65(1): 408-414.
|
[16] |
CHU Z , LE T A , NGUYEN H X ,et al. Robust sum secrecy rate optimization for MIMO two-way full duplex systems[C]// 2017 IEEE 86th Vehicular Technology Conference. Piscataway:IEEE Press, 2017: 1-5.
|
[17] |
TEKIN E , YENER A . The general Gaussian multiple-access and two-way wiretap channels:achievable rates and cooperative jamming[J]. IEEE Transactions on Information Theory, 2008,54(6): 2735-2751.
|
[18] |
LI Q , ZHANG Y , LIN J ,et al. Full-duplex bidirectional secure communications under perfect and distributionally ambiguous eavesdropper's CSI[J]. IEEE Transactions on Signal Processing, 2017,65(17): 4684-4697.
|
[19] |
CHU Z , CUMANAN K , DING Z ,et al. Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer[J]. IEEE Transactions on Vehicular Technology, 2015,64(5): 1833-1847.
|
[20] |
NESTEROV Y , NEMIROVSKII A . Interior-point polynomial algorithms in convex programming[M]. Philadelphia: Society for Industrial and Applied MathematicsPress, 1994.
|
[21] |
VOROBYOV S A , GERSHMAN A B , LUO Z Q . Robust adaptive beamforming using worst-case performance optimization:a solution to the signal mismatch problem[J]. IEEE Transactions on Signal Processing, 2003,51(2): 313-324.
|
[22] |
GHARAVOL E A , LARSSON E G . The sign-definiteness lemma and its applications to robust transceiver optimization for multiuser MIMO systems[J]. IEEE Transactions on Signal Processing, 2013,61(2): 238-252.
|
[23] |
LI Q , YANG L . Artificial noise aided secure precoding for MIMO untrusted two-way relay systems with perfect and imperfect channel state information[J]. IEEE Transactions on Information Forensics and Security, 2018,13(10): 2628-2638.
|
[24] |
HORN R A , JOHNSON C R . Matrix analysis[M]. Cambridge: Cambridge University PressPress, 1985.
|
[25] |
KHISTI A , WORNELL G W . Secure transmission with multiple antennas II:the MIMOME wiretap channel[J]. IEEE Transactions on Information Theory, 2010,56(11): 5515-5532.
|