References
[1]
Wyner
D.
The wire-tap channel.
Bell Syst Tech J,
1975, 54: 1355-1367
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=The wire-tap channel&author=Wyner D&publication_year=1975&journal=Bell Syst Tech J&volume=54&pages=1355-1367
[2]
Bloch
M,
Barros
J,
Rodrigues
M R D, et al.
Wireless information theoretic security.
IEEE Trans Inf Theory,
2008, 54: 2515-2534
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Wireless information theoretic security&author=Bloch M&author=Barros J&author=Rodrigues M R D&publication_year=2008&journal=IEEE Trans Inf Theory&volume=54&pages=2515-2534
[3]
Liu
T,
Shamai
S.
A note on the secrecy capacity of the multiple-antenna wiretap channel.
IEEE Trans Inf Theory,
2009, 55: 2547-2553
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=A note on the secrecy capacity of the multiple-antenna wiretap channel&author=Liu T&author=Shamai S&publication_year=2009&journal=IEEE Trans Inf Theory&volume=55&pages=2547-2553
[4]
Li
Q,
Song
H,
Huang
K.
Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels.
IEEE Commu Lett,
2013, 17: 892-895
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Achieving secure transmission with equivalent multiplicative noise in MISO wiretap channels&author=Li Q&author=Song H&author=Huang K&publication_year=2013&journal=IEEE Commu Lett&volume=17&pages=892-895
[5]
Li
Q,
Ma
W-K,
Man-Cho
So A.
A safe approximation approach to secrecy outage design for MIMO wiretap channels.
IEEE Sig Process Lett,
2014, 21: 118-121
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=A safe approximation approach to secrecy outage design for MIMO wiretap channels&author=Li Q&author=Ma W-K&author=Man-Cho So A&publication_year=2014&journal=IEEE Sig Process Lett&volume=21&pages=118-121
[6]
Sun
X,
Wang
J,
Xu
W, et al.
Performance of secure communications over correlated fading channels.
IEEE Sig Process Lett,
2012, 19: 479-482
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Performance of secure communications over correlated fading channels&author=Sun X&author=Wang J&author=Xu W&publication_year=2012&journal=IEEE Sig Process Lett&volume=19&pages=479-482
[7]
Liu X. Secrecy capacity of wireless links subject to log-normal fading. In: Proceedings of 7th International Conference on Communications and Networking in China, Kunming, 2012. 167--172.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Liu X. Secrecy capacity of wireless links subject to log-normal fading. In: Proceedings of 7th International Conference on Communications and Networking in China, Kunming, 2012. 167--172&
[8]
Zhang X, Pan G, Tang C, et al. Performance analysis of physical layer security over independent/correlated log-normal fading channels. In: Proceedings of Australasian Telecommunication Networks and Applications Conference, Melbourne, 2014. 23--27.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zhang X, Pan G, Tang C, et al. Performance analysis of physical layer security over independent/correlated log-normal fading channels. In: Proceedings of Australasian Telecommunication Networks and Applications Conference, Melbourne, 2014. 23--27&
[9]
Zahurul M, Sarkar I, Ratnarajah T. Secrecy capacity over correlated log-normal fading channel. In: Proceedings of IEEE International Conference on Communications, Ottawa, 2012. 883--887.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Zahurul M, Sarkar I, Ratnarajah T. Secrecy capacity over correlated log-normal fading channel. In: Proceedings of IEEE International Conference on Communications, Ottawa, 2012. 883--887&
[10]
Mitola J. Cognitive radio: an integrated agent architecture for software defined radio. Dissertation for Ph.D. Degree. Stockholm: KTH, 2000.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Mitola J. Cognitive radio: an integrated agent architecture for software defined radio. Dissertation for Ph.D. Degree. Stockholm: KTH, 2000&
[11]
Shu
Z,
Qian
Y,
Ci
S.
On physical layer security for cognitive radio networks.
IEEE Netw,
2013, 27: 28-33
Google Scholar
http://scholar.google.com/scholar_lookup?title=On physical layer security for cognitive radio networks&author=Shu Z&author=Qian Y&author=Ci S&publication_year=2013&journal=IEEE Netw&volume=27&pages=28-33
[12]
Zou
Y,
Wang
X,
Shen
W.
Physical-layer security with multiuser scheduling in cognitive radio networks.
IEEE Trans Commu,
2013, 61: 5103-5113
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Physical-layer security with multiuser scheduling in cognitive radio networks&author=Zou Y&author=Wang X&author=Shen W&publication_year=2013&journal=IEEE Trans Commu&volume=61&pages=5103-5113
[13]
Sakran
H,
Shokair
M,
Nasr
O, et al.
Proposed relay selection scheme for physical layer security in cognitive radio networks.
IET Commun,
2012, 6: 2676-2687
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Proposed relay selection scheme for physical layer security in cognitive radio networks&author=Sakran H&author=Shokair M&author=Nasr O&publication_year=2012&journal=IET Commun&volume=6&pages=2676-2687
[14]
Wen
H,
Li
S,
Zhu
X, et al.
A framework of the PHY-layer approach to defense against security threats in cognitive radio networks.
IEEE Netw,
2013, 27: 34-39
Google Scholar
http://scholar.google.com/scholar_lookup?title=A framework of the PHY-layer approach to defense against security threats in cognitive radio networks&author=Wen H&author=Li S&author=Zhu X&publication_year=2013&journal=IEEE Netw&volume=27&pages=34-39
[15]
Tang
C,
Pan
G,
Li
T.
Secrecy outage analysis of underlay cognitive radio unit over Nakagami-$m$ fading channels.
IEEE Wirel Commun Lett,
2014, 3: 609-612
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Secrecy outage analysis of underlay cognitive radio unit over Nakagami-$m$ fading channels&author=Tang C&author=Pan G&author=Li T&publication_year=2014&journal=IEEE Wirel Commun Lett&volume=3&pages=609-612
[16]
Elkashlan
M,
Wang
L,
Duong
T Q, et al.
On the security of cognitive radio networks.
IEEE Trans Veh Techol,
2015, 64: 3790-3795
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=On the security of cognitive radio networks&author=Elkashlan M&author=Wang L&author=Duong T Q&publication_year=2015&journal=IEEE Trans Veh Techol&volume=64&pages=3790-3795
[17]
Papoulis A. Probability, Random Variables and Stochastic Processes. 4th ed. New York: McGraw Hill, 2001.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Papoulis A. Probability, Random Variables and Stochastic Processes. 4th ed. New York: McGraw Hill, 2001&
[18]
He
F,
Man
H,
Wang
W.
Maximal ratio diversity combining enhanced security.
IEEE Commun Lett,
2011, 15: 509-511
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Maximal ratio diversity combining enhanced security&author=He F&author=Man H&author=Wang W&publication_year=2011&journal=IEEE Commun Lett&volume=15&pages=509-511
[19]
Krishnamoorthy K. Handbook of Statistical Distributions with Applications. New York: Chapman & Hall, 2006.
Google Scholar
http://scholar.google.com/scholar_lookup?title=Krishnamoorthy K. Handbook of Statistical Distributions with Applications. New York: Chapman & Hall, 2006&
[20]
Fenton
L.
The sum of log-normal probability distributions in scatter transmission systems.
IRE Trans Commun Syst,
1960, 8: 57-67
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=The sum of log-normal probability distributions in scatter transmission systems&author=Fenton L&publication_year=1960&journal=IRE Trans Commun Syst&volume=8&pages=57-67
[21]
Pan
G,
Tang
C,
Zhang
X, et al.
Physical layer security over non-small scale fading channels.
IEEE Trans Veh Tech,
2016, 65: 1326-1339
CrossRef
Google Scholar
http://scholar.google.com/scholar_lookup?title=Physical layer security over non-small scale fading channels&author=Pan G&author=Tang C&author=Zhang X&publication_year=2016&journal=IEEE Trans Veh Tech&volume=65&pages=1326-1339