Author of the publication

Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint.

, , , , , and . WCNC, page 1-6. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing wireless secrecy via cooperation: signal design and optimization., and . IEEE Communications Magazine, 53 (12): 47-53 (2015)Secrecy outage of a two-user slow fading broadcast channel., , , and . GLOBECOM, page 4108-4113. IEEE, (2014)Improving the Physical-Layer Security of Wireless Two-Way Relaying via Analog Network Coding., , and . GLOBECOM, page 1-6. IEEE, (2011)Blind closed-form DOA estimation for distributed sources., , , and . ISCAS, page 2821-2824. IEEE, (2012)Projection-based power allocation scheme for joint transmission system., , and . WCSP, page 1-5. IEEE, (2011)Optimization of Postal Distribution Network Based on Rendezvous with Heterogeneous Vehicles and Capacity Constraints., , and . KES, volume 60 of Procedia Computer Science, page 1347-1356. Elsevier, (2015)A Linear Analog Network Coding for Asynchronous Two-Way Relay Networks., , and . IEEE Trans. Wireless Communications, 9 (12): 3630-3637 (2010)Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems., , and . IEEE Trans. Vehicular Technology, 64 (10): 4893-4898 (2015)Joint Source-Relay Precoding and Power Allocation for Secure Amplify-and-Forward MIMO Relay Networks., , and . IEEE Trans. Information Forensics and Security, 9 (8): 1240-1250 (2014)Range and DOA Estimation of Near-field Sources via the Fourth-order Statistics., , , and . ISCAS, page 2465-2468. IEEE, (2009)