[1] Wyner A D.The wire-tap channel[J]. Bell System Technical Journal,1975,54(8):1355-1387.
[2] Zhang R,Song L,Han Z,et al.Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology,2012,61(8):3693-3704.
[3] Huang J,Mukherjee A,Swindlehurst A L.Secure communication via an untrusted non-regenerative relay in fading channels[J]. IEEE Transactions on Signal Processing,2013,61(10):2536-2550.
[4] Shen Y,Jiang X,Ma J,et al.Secure and Reliable Transmission with Cooperative Relays in Two Hop Wireless Networks[M]. Information Technology Convergence,Springer Netherlands,2013.253:397-406.
[5] Zou Y,Wang X,Shen W.Optimal relay selection for physical-layer security in cooperative wireless networks[J]. IEEE Journal on Selected Areas in Communications,2013,31(10):2099-2111.
[6] Huang J,Swindlehurst A L.Cooperative jamming for secure communications in MIMO relay networks[J]. IEEE Transactions on Signal Processing,2011,59(10):4871-4884.
[7] Krikidis I,Thompson J S,McLaughlin S.Relay selection for secure cooperative networks with jamming[J]. IEEE Transactions on Wireless Communications,2009,8(10):5003-5011.
[8] Chen J,Zhang R,Song L,et al.Joint relay and jammer selection for secure two-way relay networks[J]. IEEE Transactions on Information Forensics and Security,2012,7(1):310-320.
[9] Jindal N.MIMO broadcast channels with finite-rate feedback[J]. IEEE Transactions on Information Theory,2006,52(11):5045-5060.
[10] Yoo T,Jindal N,Goldsmith A.Multi-antenna downlink channels with limited feedback and user selection[J]. IEEE Journal on Selected Areas in Communications,2007,25(7):1478-1491.
[11] Erlin Z,Shihua Z,Zhong Z,et al.On the performance of amplify-and-forward relay systems with limited feedback beamforming[J]. IEICE Transactions on Communications,2008,91(6):2053-2057.
[12] Chen X,Yin R.Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback[J]. IEEE Transactions on Wireless Communications,IEEE,2013,2(5):503-506.
[13] Li N,Tao X F,Xu J.Ergodic secrecy sum-rate for downlink multiuser MIMO systems with limited CSI feedback[J]. IEEE Transactions on Communication Letters,2014,18(6):969-972.
[14] Bashar S,Ding Z,Li G Y.On secrecy of codebook-based transmission beamforming under receiver limited feedback[J]. IEEE Transactions on Wireless Communications,2011,10(4):1212-1223.
[15] Gerbracht S,Scheunert C,Jorswieck E A.Secrecy outage in MISO systems with partial channel information[J]. IEEE Transactions on Information Forensics and Security,2012,7(2):704-716.
[16] Tekin E.The Gaussian multiple access wire-tap channel:wireless secrecy and cooperative jamming[A]. Proceedings of the IEEE Information Theory and Applications Workshop(ITA)[C]. San Diego,California,2007.404-413.
[17] Pei M,Ma D,Wei J.Adaptive limited feedback for MISO wiretap channels with cooperative jamming[J]. IEEE Transactions on Signal Processing,2013,62(4):993-1004.
[18] Gradshteyn I S,Ryzhik I M.Table of Integrals,Series,and Products[M]. New York:Academic Press,1965. |