1 |
LINZ, LINM, CHAMPAGNEB, et al. Secure and energy efficient transmission for RSMA-based cognitive satellite-terrestrial networks[J]. IEEE Wireless Communications Letters, 2020, 10(2): 251-255.
|
2 |
HUANGQ Q, LINM, WANGJ B, et al. Energy efficient beamforming schemes for satellite-aerial-terrestrial networks[J]. IEEE Transactions on Communications, 2020, 68(6): 3863-3875.
|
3 |
HUANGQ Q, LINM, ZHUW P, et al. Performance analysis of integrated satellite-terrestrial multiantenna relay networks with multiuser scheduling[J]. IEEE Transactions on Aerospace and Electronic Systems, 2020, 56(4): 2718-2731.
|
4 |
LINZ, LINM, WANGJ B, et al. Joint beamforming and power allocation for satellite-terrestrial integrated networks with non-orthogonal multiple access[J]. IEEE Journal of Selected Topics in Signal Processing, 2019, 13(3): 657-670.
|
5 |
FRITSCHEKR, WUNDERG. On the Gaussian multiple access wiretap channel and the Gaussian wiretap channel with a helper: Achievable schemes and upper bounds[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(5): 1224-1239.
|
6 |
ALLENT, TAJERA, AL-DHAHIRN. Secure alamouti multiple access channel transmissions: Multiuser transmission and multi-antenna eavesdroppers[J]. IEEE Wireless Communications Letters, 2019, 8(5): 1510-1513.
|
7 |
CHAABANA, REZKIZ, ALOUINIM S. Capacity bounds and high-SNR capacity of MIMO intensity-modulation optical channels[J]. IEEE Transactions on Wireless Communications, 2018, 17(5): 3003-3017.
|
8 |
KUMARS, PIVAROG, FRAIDENRAICHG. Comments on "cutset bounds on the capacity of MIMO relay channels"[J]. IEEE Access, 2018, 6: 35129-35131.
|
9 |
CUMANANK, DINGZ G, XUM, et al. Secrecy rate optimization for secure multicast communications[J]. IEEE Journal of Selected Topics in Signal Processing, 2016, 10(8): 1417-1432.
|
10 |
LINM, LINZ, ZHUW P, et al. Joint beamforming for secure communication in cognitive satellite terrestrial networks[J]. IEEE Journal on Selected Areas in Communications, 2018, 36(5): 1017-1029.
|
11 |
宋高俊, 曹寿国. 基于部分信道信息的卫星多波束联合预编码优化方法[J]. 电子学报, 2015, 43(11): 2232-2236.
|
|
SONGG J, CAOS G. Joint precoding optimization of multibeam satellite system based on partial channel information[J]. Acta Electronica Sinica, 2015, 43(11): 2232-2236. (in Chinese)
|
12 |
ZHENGG, ARAPOGLOUP D, OTTERSTENB. Physical layer security in multibeam satellite systems[J]. IEEE Transactions on Wireless Communications, 2012, 11(2): 852-863.
|
13 |
王舒, 达新宇. 非理想信道状态下多波束卫星通信的鲁棒安全传输设计[J]. 电子与信息学报, 2017, 39(2): 342-350.
|
|
WANGS, DAX Y. Robust secure transmit methods for multibeam satellite communication with imperfect channel state information[J]. Journal of Electronics & Information Technology, 2017, 39(2): 342-350. (in Chinese)
|
14 |
LINZ, LINM, CHAMPAGNEB, et al. Secure beamforming for cognitive satellite terrestrial networks with unknown eavesdroppers[J]. IEEE Systems Journal, 2021, 15(2): 2186-2189.
|
15 |
ZHUX M, JIANGC X, YINL G, et al. Cooperative multigroup multicast transmission in integrated terrestrial-satellite networks[J]. IEEE Journal on Selected Areas in Communications, 2018, 36(5): 981-992.
|
16 |
CHRISTOPOULOSD, CHATZINOTASS, OTTERSTENB. Multicast multigroup precoding and user scheduling for frame-based satellite communications[J]. IEEE Transactions on Wireless Communications, 2015, 14(9): 4695-4707.
|
17 |
LINZ, LINM, DE COLAT, et al. Supporting IoT with rate-splitting multiple access in satellite and aerial integrated networks[J]. IEEE Internet of Things Journal, 2021, 8(14): 11123-11134.
|
18 |
LINZ, LINM, WANGJ B, et al. Robust secure beamforming for 5G cellular networks coexisting with satellite networks[J]. IEEE Journal on Selected Areas in Communications, 2018, 36(4): 932-945.
|
19 |
BOYDS, VANDENBERGHEL. Convex Optimization[M]. Cambridge: Cambridge University Press, 2004.
|
20 |
MUTAPCICA, BOYDS. Cutting-set methods for robust convex optimization with pessimizing oracles[J]. Optimization Methods and Software, 2009, 24(3): 381-406.
|
21 |
LIQ, LIC, LINJ R. Constant modulus secure beamforming for multicast massive MIMO wiretap channels[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 264-275.
|