2014
DOI: 10.1109/lsp.2013.2296941
|View full text |Cite
|
Sign up to set email alerts
|

Rank-Two Beamformed Secure Multicasting for Wireless Information and Power Transfer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
31
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(31 citation statements)
references
References 9 publications
0
31
0
Order By: Relevance
“…where P ωU,ω U (a) denotes the element of matrix P U (a) as defined in (5). Assume that the linear programming problem is feasible, the stationary best response policy of the user can be obtained as follows:…”
Section: A User Side Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…where P ωU,ω U (a) denotes the element of matrix P U (a) as defined in (5). Assume that the linear programming problem is feasible, the stationary best response policy of the user can be obtained as follows:…”
Section: A User Side Analysismentioning
confidence: 99%
“…The constrained Nash equilibrium ensures that the player cannot achieve higher reward by adopting 5 any other stationary policies while the other player does not change their stationary policy.…”
Section: Solution and Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of them, such as [3], [5], [8]- [11], [16]- [19], [22]- [23], [27]- [29], [34]- [35], studied the secrecy transmission in SWIPT while considering perfect/imperfect CSI. Making use of artificial noise method, the authors of [44] designed a joint information and energy transmit beamforming scheme to maximize the secrecy rate of the IR in a secret MISO SWIPT system.…”
Section: Introductionmentioning
confidence: 99%
“…In [12], [13], the authors presented the optimal beamforming design and power allocation scheme for multiple-input single-output (MISO) systems in the presence of passive eavesdroppers, later in [14], the issue of uncertain eavesdroppers was tackled, where joint optimization of information and energy beamforming and power allocation were studied. Latest works have considered the security issue in more sophisticated SWIPT systems, such as relay [15], multicast [16], cognitive radio [17] and OFDMA systems [18]. A common of these works is that they consider hybrid network architecture, where the information source also acts as the energy source.…”
mentioning
confidence: 99%