[1] Sheng Z,Tuan H D,Duong T Q,Poor H V.Beamforming optimization for physical layer security in MISO wireless networks[J].IEEE Transactions on Signal Processing,2018,66(14):3710-3723.
[2] Li C,He C,Jiang L,Liu F.Robust beamforming design for max-min SINR in MIMO interference channels[J].IEEE Communications Letters,2016,20(4):724-727.
[3] Romero-Zurita N,Ghogho M,McLernon D.Outage probability based power distribution between data and artificial noise for physical layer security[J].IEEE Signal Processing Letters,2012,19(2):71-74.
[4] Zhu Y,Zhou Y,Patel S,Chen X,Pang L,Xue Z.Artificial noise generated in MIMO scenario:optimal power design[J].IEEE Signal Processing Letters,2013,20(10):964-967.
[5] Chae S H,Choi W,Lee J H,Quek T Q S.Enhanced secrecy in stochastic wireless networks:artificial noise with secrecy protected zone[J].IEEE Transactions on Information Forensics and Security,2014,9(10):1617-1628.
[6] Foroozanfard E,Franek O,Tatomirescu A,Tsakalaki E,Carvalho E D,Pedersen G F.Full-duplex MIMO system based on antenna cancellation technique[J].Electronics Letters,2014,50(16):1116-1117.
[7] Tuyen L A,Tran L C,Huang X.Cyclostationary analysis of analog least mean square loop for self-interference cancellation in in-band full-duplex systems[J].IEEE Communications Letters,2017,21(12):2738-2741.
[8] Khaledian S,Farzami F,Smida B,Erricolo D.Inherent self-interference cancellation at 900 MHz for in-band full-duplex applications[A].2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON)[C].Sand Key,FL,USA:IEEE,2018.1-4.
[9] 吴飞,邵士海,唐友喜.一种基于多天线波束成形的全双工自干扰抵消算法[J].电子学报,2017,45(1):8-15. Wu F,Shao S h,Tang Y X.A novel self-interference cancellation algorithm using multi-antenna beamforming in full-duplex system[J].Acta Electronica Sinica,2017,45(1):8-15 (in Chinese).
[10] Zheng G,Krikidis I,Li J,Petropulu A P,Ottersten B.Improving physical layer secrecy using full-duplex jamming receivers[J].IEEE Transactions on Signal Processing,2013,61(20):4962-4974.
[11] Zhou Y,Zhu Y,Xue Z.Enhanced MIMOME wiretap channel via adopting full-duplex MIMO radios[A].2014 IEEE Global Communications Conference[C].Austin,TX,USA:IEEE,2014.3320-3325.
[12] Kim J,Kim J,Lee J,Choi J P.Physical-layer security against smart eavesdroppers:exploiting full-duplex receivers[J].IEEE Access,2018,6:32945-32957.
[13] Chen G,Gong Y,Xiao P,Chambers J A.Physical layer network security in the full-duplex relay system[J].IEEE Transactions on Information Forensics and Security,2015,10(3):574-583.
[14] Li Y,Zhao R,Wang Y,Pan G,Li C.Artificial noise aided precoding with imperfect CSI in full-duplex relaying secure communications[J].IEEE Access,2018,6:44107-44119.
[15] Feng R,Li Q,Zhang Q,Qin J.Robust secure beamforming in MISO full-duplex two-way secure communications[J].IEEE Transactions on Vehicular Technology,2016,65(1):408-414.
[16] Chu Z,Le T A,Nguyen H X,Nallanathan A,Karamanoglu M.Robust sum secrecy rate optimization for MIMO two-way full duplex systems[A].2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)[C].Toronto,ON,Canada:IEEE,2017.1-5.
[17] Tekin E,Yener A.The general Gaussian multiple-access and two-way wiretap channels:achievable rates and cooperative jamming[J].IEEE Transactions on Information Theory,2008,54(6):2735-2751.
[18] Chiani M,Win M Z,Shin H.MIMO networks:the effects of interference[J].IEEE Transactions on Information Theory,2010,56(2):336-349.
[19] Hardy G H,Littlewood J E,Polya G.Inequalities[M].Cambridge,England:Cambridge University Press,1988.
[20] Nesterov Y,Nemirovskii A.Interior-pointPolynomial Algorithms in Convex Programming[M].Philadelphia,PA,USA:SIAM,1994. |