Related references
Note: Only part of the references are listed.Can a multi-hop link relying on untrusted amplify-and-forward relays render security?
Milad Tatar Mamaghani et al.
WIRELESS NETWORKS (2021)
Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers
Kunrui Cao et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Cooperative Jamming-Aided Secure Wireless Powered Communication Networks: A Game Theoretical Formulation
Yijie Zhong et al.
IEEE COMMUNICATIONS LETTERS (2020)
QoS-Based Robust Cooperative-Jamming-Aided Beamforming for Correlated Wiretap Channels
Sai Xu et al.
IEEE SIGNAL PROCESSING LETTERS (2020)
Achievable Ergodic Secrecy Rate in Bursty Interference Channels With Opportunistic User Scheduling
Jae-Hwan Lee et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2019)
Secure Alamouti Multiple Access Channel Transmissions: Multiuser Transmission and Multi-Antenna Eavesdroppers
T. Allen et al.
IEEE WIRELESS COMMUNICATIONS LETTERS (2019)
On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT
Milad Tatar Mamaghani et al.
IEEE ACCESS (2019)
Secure Beamforming for MIMO-NOMA-Based Cognitive Radio Network
Nibedita Nandan et al.
IEEE COMMUNICATIONS LETTERS (2018)
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
Milad Tatar Mamaghani et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)
Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things
Lin Hu et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
A New Cooperative Jamming Technique for a Two-Hop Amplify-and-Forward Relay Network With an Eavesdropper
Yongyun Choi et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)
Exploiting Opportunistic Scheduling in Uplink Wiretap Networks
Xin Ge et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)
Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis
Kanapathippillai Cumanan et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)
Linear Precoding for Fading Cognitive Multiple-Access Wiretap Channel With Finite-Alphabet Inputs
Juening Jin et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)
Secure Communication in Uplink Transmissions: User Selection and Multiuser Secrecy Gain
Hao Deng et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2016)
Artificial Noise Assisted Secure Transmission for Distributed Antenna Systems
Hui-Ming Wang et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2016)
Secrecy Rate Maximization With Uncoordinated Cooperative Jamming by Single-Antenna Helpers Under Secrecy Outage Probability Constraint
Pengcheng Mu et al.
IEEE COMMUNICATIONS LETTERS (2015)
Social Tie Based Cooperative Jamming for Physical Layer Security
Ling Tang et al.
IEEE COMMUNICATIONS LETTERS (2015)
Low-Overhead Distributed Jamming for SIMO Secrecy Transmission with Statistical CSI
Chao Wang et al.
IEEE SIGNAL PROCESSING LETTERS (2015)
Uncoordinated Jammer Selection for Securing SIMOME Wiretap Channels: A Stochastic Geometry Approach
Chao Wang et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2015)
On Ergodic Secrecy Rate for MISO Wiretap Broadcast Channels with Opportunistic Scheduling
Minyan Pei et al.
IEEE COMMUNICATIONS LETTERS (2014)
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
Amitav Mukherjee et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels
Pin-Hsun Lin et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)
Joint Cooperative Beamforming and Jamming to Secure AF Relay Systems With Individual Power Constraint and No Eavesdropper's CSI
Hui-Ming Wang et al.
IEEE SIGNAL PROCESSING LETTERS (2013)
Opportunistic Secrecy with a Strict Delay Constraint
Karim Khalil et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2013)
Opportunistic Relaying for Secrecy Communications: Cooperative Jamming vs. Relay Chatting
Zhiguo Ding et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2011)
The general Gaussian multiple-access and two-way wiretap channels: Achievable rates and cooperative jamming
Ender Tekin et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2008)
Relating symbolic and cryptographic secrecy
M Backes et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2005)