2018 IEEE Wireless Communications and Networking Conference (WCNC) 2018
DOI: 10.1109/wcnc.2018.8377251
|View full text |Cite
|
Sign up to set email alerts
|

Artificial-noise-aided secure beamforming in full-duplex wireless-powered relay

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…For the above non-convex optimization problem (29), firstly, we should eliminate the equality constraint and convert it into an unconstrained problem. To remove the ZF constraint H RR W = 0, we redefine…”
Section: B Problem Optimization and Solutionmentioning
confidence: 99%
See 2 more Smart Citations
“…For the above non-convex optimization problem (29), firstly, we should eliminate the equality constraint and convert it into an unconstrained problem. To remove the ZF constraint H RR W = 0, we redefine…”
Section: B Problem Optimization and Solutionmentioning
confidence: 99%
“…The authors also considered the practical interference-limited scenario and derived closed-form cumulative distribution function of the SINR at the destination and eavesdropper nodes. In [28], [29], the secrecy rate maximization problem subject to the constraint of harvested energy was considered, and the relay could harvest energy from the SI. In [28], it investigated two relaying protocols, namely amplify-and-forward (AF) and decode-and forward (DF).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation