[1] A Khisti, G W Wornell.Secure transmission with multiple antennas Part I: The MISOME wiretap channel[J]. Information Theory, IEEE Transactions on (S0018-9448), 2010, 56(7): 3088-3104. [2] A Khisti, G W Wornell.Secure transmission with multiple antennas Part II: The MIMOME wiretap channel J]. Information Theory, IEEE Transactions on (S0018-9448), 2010, 56(11): 5515-5532. [3] A D Wyner.The wiretap channel[J]. Bell System Technology Journal (S0005-8580), 1975, 54(7): 1355-1387. [4] S Goel, R Negi.Guaranteeing secrecy using artificial noise[J]. Wireless Communications, IEEE Transactions on (S1536-1276), 2008, 7(6): 2180-2189. [5] H-M Wang, T Zheng, X-G Xia.Secure MISO wiretap channels with multiantenna passive eavesdropper: Artificial noise vs. artificial fast fading[J]. Wireless Communications, IEEE Transactions on (S1536-1276), 2015, 14(1): 94-106. [6] N Romero-Zurita, D McLernon, M Ghogho.Physical layer security by robust masked beamforming and protected zone optimization[J]. IET Communications (S1751-8628), 2014, 8(8): 1248-1257. [7] Z Ding, Z Ma, P Fan.Asymptotic studies for the impact of antenna selection on secure two-way relaying communications with artificial noise[J]. Wireless Communications, IEEE Transactions on (S1536-1276), 2014, 13(4): 2189-2203. [8] X Wang, K Wang, X-D Zhang.Secure relay beamforming with imperfect channel side information[J]. IEEE Transactions on Vehicular Technology (S0018-9545), 2013, 62(5): 2140-2155. [9] X Wang, Z Zhang, K Long.Secure beamforming for multiple antenna amplify-and-forward relay networks[J]. Signal Processing, IEEE Transactions on (S1053-587X), 2015, 64(6): 1477-1492. [10] D Deng, L Fan, R Zhao, et al.Secure communications in multiple amplify-and-forward relay networks with outdated channel state information[J]. Transactions on Emerging Telecommunications Technologies (S2161-3915), 2016, 33(4): 457-464. [11] L Fan, X Lei, R Q Hu, et al.Outdated relay selection in two-way relay network[J]. IEEE Transactions on Vehicular Technology (S0018-9545), 2013, 62(8): 4051-4057. [12] L Fan, X Lei, T Q Duong, et al.Karagiannidis, Secure multiuser communications in multiple amplify-and-forward relay networks[J]. IEEE Transactions on Communications (S0090-6778), 2014, 62(9): 3299-3310. [13] H Hui, A Swindlehurst, G Li, et al.Secure relay and jammer selection for physical layer security[J]. Signal Processing Letters, IEEE (S1070-9908), 2015, 22(8): 1147-1151. [14] T-X Zheng, H-M Wang, J Yuan, et al.Multi-antenna transmission with artificial noise against randomly distributed eavesdroppers[J]. IEEE Transactions on Communications (S1536-1276), 2015, 63(11): 4347-4362. [15] J Mo, M Tao, Y Liu, et al.Secure beamforming for MIMO two-way communications with an untrusted relay[J]. Signal Processing, IEEE Transactions on (S1053-587X), 2014, 62(9): 2185-2199. [16] L Sun, P Ren, Q Du, et al.Security-aware relaying scheme for cooperative networks with untrusted relay nodes[J]. Communications Letters, IEEE (S0163-6804), 2015, 19(3): 463-466. [17] X He, A Yener.Cooperation with an untrusted relay: a secrecy perspective[J]. IEEE Transactions on Information Theory (S0018-9448), 2010, 56(8): 3807-3827. [18] M Seyfi, S Muhaidat, J Liang.Amplify-and-forward selection cooperation over rayleigh fading channels with imperfect CSI[J]. Wireless Communications IEEE Transactions on (S1536-1276), 2012, 11(1): 199-209. [19] B V Nguyen, K Kim.Secrecy outage probability of optimal relay selection for secure AnF cooperative networks[J]. Communications Letters, IEEE (S0163-6804), 2015, 19(12): 2086-2089. [20] H A David, H N Nagaraja.Order Statistics[M]. 3rd. USA: Wiley Online Library, 2003: 223-224. |