Secure Transmission and Self-Energy Recycling With Partial Eavesdropper CSI (English)
- New search for: Qiao, Jingping
- Further information on Qiao, Jingping:
- https://orcid.org/0000-0002-9841-6586
- New search for: Zhang, Haixia
- Further information on Zhang, Haixia:
- https://orcid.org/0000-0001-5081-7287
- New search for: Zhao, Feng
- Further information on Zhao, Feng:
- https://orcid.org/0000-0002-5730-2208
- New search for: Yuan, Dongfeng
- New search for: Qiao, Jingping
- Further information on Qiao, Jingping:
- https://orcid.org/0000-0002-9841-6586
- New search for: Zhang, Haixia
- Further information on Zhang, Haixia:
- https://orcid.org/0000-0001-5081-7287
- New search for: Zhao, Feng
- Further information on Zhao, Feng:
- https://orcid.org/0000-0002-5730-2208
- New search for: Yuan, Dongfeng
In:
IEEE Journal on Selected Areas in Communications
;
36
, 7
;
1531-1543
;
2018
- Article (Journal) / Electronic Resource
-
Title:Secure Transmission and Self-Energy Recycling With Partial Eavesdropper CSI
-
Contributors:Qiao, Jingping ( author ) / Zhang, Haixia ( author ) / Zhao, Feng ( author ) / Yuan, Dongfeng ( author )
-
Published in:IEEE Journal on Selected Areas in Communications ; 36, 7 ; 1531-1543
-
Publisher:
- New search for: IEEE
-
Publication date:2018-07-01
-
Size:1418673 byte
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 36, Issue 7
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1363
-
Guest Editorial Physical Layer Security for 5G Wireless Networks, Part IIWu, Yongpeng / Khisti, Ashish / Xiao, Chengshan / Caire, Giuseppe / Wong, Kai-Kit / Gao, Xiqi et al. | 2018
- 1367
-
Secure Satellite-Terrestrial Transmission Over Incumbent Terrestrial Networks via Cooperative BeamformingDu, Jun / Jiang, Chunxiao / Zhang, Haijun / Wang, Xiaodong / Ren, Yong / Debbah, Merouane et al. | 2018
- 1383
-
Hybrid MIMO and Phased-Array Directional Modulation for Physical Layer Security in mmWave Wireless CommunicationsWang, Wen-Qin / Zheng, Zhi et al. | 2018
- 1397
-
Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point ProcessesZhu, Yongxu / Zheng, Gan / Fitch, Michael et al. | 2018
- 1410
-
Joint Beamforming and Jamming Design for mmWave Information Surveillance SystemsCai, Yunlong / Zhao, Cunzhuo / Shi, Qingjiang / Li, Geoffrey Ye / Champagne, Benoit et al. | 2018
- 1426
-
Secure NOMA Based Two-Way Relay Networks Using Artificial Noise and Full DuplexZheng, Beixiong / Wen, Miaowen / Wang, Cheng-Xiang / Wang, Xiaodong / Chen, Fangjiong / Tang, Jie / Ji, Fei et al. | 2018
- 1441
-
Secure Communications in NOMA System: Subcarrier Assignment and Power AllocationZhang, Haijun / Yang, Ning / Long, Keping / Pan, Miao / Karagiannidis, George K. / Leung, Victor C. M. et al. | 2018
- 1453
-
Intelligent Interference Exploitation for Heterogeneous Cellular Networks Against EavesdroppingZou, Yulong et al. | 2018
- 1465
-
Blind Authentication at the Physical Layer Under Time-Varying Fading ChannelsXie, Ning / Zhang, Shengli et al. | 2018
- 1480
-
A New Design Paradigm for Secure Full-Duplex Multiuser SystemsNguyen, Van-Dinh / Nguyen, Hieu V. / Dobre, Octavia A. / Shin, Oh-Soon et al. | 2018
- 1499
-
Secrecy Performance of Finite-Sized In-Band Selective Relaying Systems With Unreliable Backhaul and Cooperative EavesdroppersLiu, Hongwu / Yeoh, Phee Lep / Kim, Kyeong Jin / Orlik, Philip V. / Poor, H. Vincent et al. | 2018
- 1517
-
Physical Detection of Misbehavior in Relay Systems With Unreliable Channel State InformationLv, Tiejun / Yin, Yajun / Lu, Yueming / Yang, Shaoshi / Liu, Enjie / Clapworthy, Gordon et al. | 2018
- 1531
-
Secure Transmission and Self-Energy Recycling With Partial Eavesdropper CSIQiao, Jingping / Zhang, Haixia / Zhao, Feng / Yuan, Dongfeng et al. | 2018
- 1544
-
Coordinated Beamforming With Artificial Noise for Secure SWIPT Under Non-Linear EH Model: Centralized and Distributed DesignsLu, Yang / Xiong, Ke / Fan, Pingyi / Zhong, Zhangdui / Letaief, Khaled Ben et al. | 2018
- 1564
-
Hierarchical Competition as Equilibrium Program With Equilibrium Constraints Towards Security-Enhanced Wireless NetworksTang, Xiao / Ren, Pinyi / Han, Zhu et al. | 2018
- 1579
-
Unified Interference Engineering for Wireless Information SecrecyRuan, Liangzhong / Conti, Andrea / Win, Moe Z. et al. | 2018
- 1593
-
Social Trust Aided D2D Communications: Performance Bound and Implementation MechanismChen, Xinlei / Zhao, Yulei / Li, Yong / Chen, Xu / Ge, Ning / Chen, Sheng et al. | 2018
- 1609
-
Secure User-Centric Clustering for Energy Efficient Ultra-Dense Networks: Design and OptimizationLin, Yan / Zhang, Rong / Yang, Luxi / Hanzo, Lajos et al. | 2018
- 1622
-
Secure Downlink Transmission in the Internet of Things: How Many Antennas Are Needed?Hu, Jianwei / Yang, Nan / Cai, Yueming et al. | 2018
- 1635
-
Tradeoff Between Delay and Physical Layer Security in Wireless NetworksZhong, Yi / Ge, Xiaohu / Han, Tao / Li, Qiang / Zhang, Jing et al. | 2018
- 1648
-
Managing Physical Layer Security in Wireless Cellular Networks: A Cyber Insurance ApproachLu, Xiao / Niyato, Dusit / Privault, Nicolas / Jiang, Hai / Wang, Ping et al. | 2018
- 1662
-
Information for Authors| 2018
- C1
-
Table of contents| 2018
- C2
-
IEEE Journal on Selected Areas in Communications| 2018
- C3
-
IEEE Communications Society Information| 2018