[1] Fan Lisheng,Lei Xianfu,Duong T Q,Elkashlan M.Secure multiuser communications in multiple amplify-and-forward relay networks[J].IEEE Transactions on Communications,2014,62(9):3299-3310.
[2] Huang Xiaobin,He Jing,Li Quanzhong,Zhang Qi,Qin Jiayin.Optimal power allocation for multicarrier secure communications in full-duplex decode-and-forward relay networks[J].IEEE Communications Letters,2014,18(12):2169-2172.
[3] Fan L,Zhang S,Duong T Q,Karagiannidis G K.Secure switch-and-stay combining (SSSC) for cognitive relay networks[J].IEEE Transactions on Communications,2016,64(1):70-82.
[4] Krikidis I,Thompson J.,Mclaughlin S,Goertz N.Amplify-and-forward with partial relay selection[J].IEEE Communications Letters,2008,12(4):235-237.
[5] Lee Jong Ho.Full-duplex relay for enhancing physical layer security in multi-hop relaying systems[J].IEEE Communications Letters,2015,19(4):525-528.
[6] Maletic N,Cabarkapa M,Neskovic N,Budimir D.Hardware impairments impact on fixed-gain AF relaying performance in Nakagami-m fading[J].Electronics Letters,2015,52(2):121-122.
[7] Wang Dong,Bai Bo,Chen Wei,Han Zhu.Energy efficient secure communication over decode-and-forward relay channels[J].IEEE Transactions on Communications,2015,63(3):892-905.
[8] Zhao Mingxiong,Wang Xiangfeng,Feng Suili.Joint power splitting and secure beamforming design in the multiple non-regenerative wireless-powered relay networks[J].IEEE Communications Letters,2015,19(9):1540-1543.
[9] Zhou Siyuan,Alfano Giuseppa,Nordio Alessandro,Chiasserini Carla Fabiana.Ergodic capacity analysis of mimo relay network over rayleigh-rician channels[J].Communications Letters IEEE,2015,19(4):601-604.
[10] Maleki Sadr M,Mahboobi B,Mehrizi S,Ahmadian-Attari M.Stochastic robust collaborative beamforming:non-regenerative relay[J].IEEE Transactions on Communications,2016,64(3):947-958.
[11] Wu Nien En,Li Hsueh Jyh.Effect of feedback delay on secure cooperative networks with joint relay and jammer selection[J].IEEE Wireless Communication Letters,2013,2(4):415-418.
[12] Suraweera,H A,Michalopoulos,D S,Karagiannidis,G K Semi-blind amplify-and-forward with partial relay selection[J].Electronics Letters,2009,45(6):317-319.
[13] Zhou Yameng,Pan Gaofeng,Li Tingting,Liu Hequn.Secrecy outage performance for partial relay selection schemes in cooperative systems[J].IET Communications,2015,9(16):1980-1987.
[14] He Biao,Zhou Xiangyun.Secure on-off transmission design with channel estimation errors[J].IEEE Transactions on Information Forensics & Security,2013,8(12):1923-1936.
[15] Dai Mingjun,Chi Sung.A distributed on-off amplify-and-forward protocol for the fading parallel relay channel[J].Communications Letters IEEE,2009,13(9):643-645.
[16] Long Min,Chen Yunfei,Renzo M Di.Performance analysis of relay selection in the presence of on-off relay traffic[J].IEEE Transactions on Vehicular Technology,2014,63(6):2959-2964.
[17] Cui Hongyu,Song Lingyang,Jiao Bingli.Weighted bidirectional relay selection for outdated channel state information[J].IEEE Transactions on Communications,2014,62(62):500-509.
[18] Deng Dan,Fan Lisheng,Zhao Rui,Hu Rose Qingyang.Secure communications in multiple amplify-and-forward relay networks with outdated channel state information[J].Transactions on Emerging Telecommunications Technologies,2016,33(4):457-464.
[19] Khan F A,Tourki K,Alouini M S,Qaraqe K A.Opportunistic fixed gain bidirectional relaying with outdated CSI[A].IEEE Vehicular Technology Conference[C].Boston,USA:IEEE Press,2015.1-5.
[20] Lei Xianfu,Fan Lisheng,Hu Rose Qingyang,Michalopoulos Diomidis S,Fan Pingzhi.Secure multiuser communications in multiple decode-and-forward relay networks with direct links[A].Global Communications Conference[C].Austin,USA.:IEEE ress,2014.3180-3185
[21] Fan Lisheng,Yang Nan,Duong Trung,Elkashlan Maged.Exploiting direct links for physical layer security in multi-user multi-relay networks[J].IEEE Transactions on Wireless Communications,2016,15(6):3856-3867.
[22] 杨斌,王文杰,殷勤业.基于混合信号的放大转发中继系统的物理层安全传输[J].电子学报,2016,44(2):268-274. YANG Bin,WANG Wen-jie,YIN Qin-ye.Secure wireless communication for af relay system with hybrid signals[J].Acta Electrica Sinica,2016,44(2):268-274.(in Chinese)
[23] Ferdinand Nuwan S,Costa Daniel Benevides da,Latva-aho Matti.Physical layer security in mimo ostbc line-of-sight wiretap channels with arbitrary transmit/receive antenna correlation[J].IEEE Wireless Communications Letters,2013,2(5):467-470.
[24] Sun L,Ren P,Du Q.,Wang Y.Security-aware relaying scheme for cooperative networks with untrusted relay nodes[J].IEEE Communications Letters,2015,19(3):463-466.
[25] Zhang S,Fan L,Peng M,Poor H.Near-optimal modulo-and-forward scheme for the untrusted relay channel[J].IEEE Transactions on Information Theory,2016,62(5):2545-2556.
[26] Ju Min Chul,Kim Do Hoon,Hwang Kyu Sung.Opportunistic transmission of nonregenerative network with untrusted relay[J].IEEE Transactions on Vehicular Technology,2015,64(6):2703-2709.
[27] 吴亚峰,赵睿,贺玉成,谢维波.基于有限反馈的非可信中继系统的物理层安全性能分析[J].电子学报,2015,43(11):2247-2254. WU Ya-feng1,ZHAO Rui1,HE Yu-cheng,XIE Wei-bo.Performance analysis of physical layer security of untrusted relay system based on limited feedback[J].Acta Electrica Sinica,2015,43(11):2247-2254.(in Chinese)
[28] Gradshteyn I S,Ryzhik I M.Table of Integrals,Series,and Products[M].San Diego,USA:Academic Press,Elsevier Inc,2007.372-374. |