[1] Bi S,Ho C K,Zhang R.Wireless powered communication:opportunities and challenges[J].IEEE Communications Magazine,2014,53(4):117-125.
[2] Ding Z,Leung K K,Goeckel D L,et al.Opportunistic relaying for secrecy communications:cooperative jamming vs relay chatting[J].IEEE Transactions on Wireless Communications,2011,10(6):1725-1729.
[3] Dong L,Han Z,Petropulu A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888.
[4] Lu X,Wang P,Niyato D,et al.Wireless networks with RF energy harvesting:a contemporary survey[J].IEEE Communications Surveys & Tutorials,2015,17(2):757-789.
[5] Nasir A A,Zhou X,Durrani S,et al.Relaying protocols for wireless energy harvesting and information processing[J].IEEE Transactions on Wireless Communications,2013,12(7):3622-3636.
[6] Ding Z,Perlaza S M,Esnaola I,et al.Power allocation strategies in energy harvesting wireless cooperative networks[J].IEEE Transactions on Wireless Communications,2014,13(2):846-860.
[7] Xing H,Wong K K,Nallanathan A,et al.Wireless powered cooperative jamming for secrecy multi-AF relaying networks[J].IEEE Transactions on Wireless Communications,2015,15(12):7971-7984.
[8] Yan F G,Wang J,Liu S,et al.Computationally efficient direction of arrival estimation with unknown number of signals[J].Digital Signal Processing,2018,78:175-184.
[9] Hasan A,Andrews J G.The guard zone in wireless ad hoc networks[J].IEEE Transactions on Wireless Communications,2007,6(3):897-906.
[10] Mukherjee A,Swindlehurst A L.Detecting passive eavesdroppers in the MIMO wiretap channel[A].IEEE International Conference on Acoustics,Speech and Signal Processing[C].Kyoto:IEEE,2012.2809-2812.
[11] Goel S,Negi R.Guaranteeing secrecy using artificial Noise[J].IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
[12] Yang Y,Li Q,Ma W K,et al.Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J].IEEE Signal Processing Letters,2013,20(1):35-38.
[13] Alabbasi A,Rezki Z,Shihada B.Energy efficient resource allocation for cognitive radios:a generalized sensing analysis[J].IEEE Transactions on Wireless Communications,2015,14(5):2455-2469.
[14] Charnes A,Cooper W W.Programming with linear fractional functionals[J].Naval Research Logistics,2010,9(3-4):181-186. |