[1]
Wyner
A D.
The Wire-Tap Channel.
Bell Syst Technical J,
1975, 54: 1355-1387
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=The Wire-Tap Channel&author=Wyner A D&publication_year=1975&journal=Bell Syst Technical J&volume=54&pages=1355-1387
[2]
Yang N, Wang L F, Giovanni G, et al. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag, 2015, 53: 20--27.
Google Scholarhttp://scholar.google.com/scholar_lookup?title=Yang N, Wang L F, Giovanni G, et al. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun Mag, 2015, 53: 20--27&
[3]
Lei
H,
Gao
C,
Guo
Y.
On Physical Layer Security Over Generalized Gamma Fading Channels.
IEEE Commun Lett,
2015, 19: 1257-1260
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=On Physical Layer Security Over Generalized Gamma Fading Channels&author=Lei H&author=Gao C&author=Guo Y&publication_year=2015&journal=IEEE Commun Lett&volume=19&pages=1257-1260
[4]
Lei
H,
Zhang
H,
Ansari
I S.
Performance Analysis of Physical Layer Security Over Generalized-K Fading Channels Using a Mixture Gamma Distribution.
IEEE Commun Lett,
2016, 20: 408-411
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Performance Analysis of Physical Layer Security Over Generalized-K Fading Channels Using a Mixture Gamma Distribution&author=Lei H&author=Zhang H&author=Ansari I S&publication_year=2016&journal=IEEE Commun Lett&volume=20&pages=408-411
[5]
Liu
X.
Probability of strictly positive secrecy capacity of the Rician-Rician fading channel.
IEEE Wireless Commun Lett,
2013, 2: 50-53
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Probability of strictly positive secrecy capacity of the Rician-Rician fading channel&author=Liu X&publication_year=2013&journal=IEEE Wireless Commun Lett&volume=2&pages=50-53
[6]
Wang
H M,
Luo
M,
Yin
Q.
Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks.
IEEE TransInformForensic Secur,
2013, 8: 2007-2020
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks&author=Wang H M&author=Luo M&author=Yin Q&publication_year=2013&journal=IEEE TransInformForensic Secur&volume=8&pages=2007-2020
[7]
Wang
H M,
Liu
F,
Yang
M.
Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems.
IEEE Trans Veh Technol,
2015, 64: 4893-4898
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Joint Cooperative Beamforming, Jamming, and Power Allocation to Secure AF Relay Systems&author=Wang H M&author=Liu F&author=Yang M&publication_year=2015&journal=IEEE Trans Veh Technol&volume=64&pages=4893-4898
[8]
Khisti
A,
Wornell
G W.
Secure transmission with multiple antennas I: the MISOME wiretap channel.
IEEE Trans Inform Theor,
2010, 56: 3088-3104
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Secure transmission with multiple antennas I: the MISOME wiretap channel&author=Khisti A&author=Wornell G W&publication_year=2010&journal=IEEE Trans Inform Theor&volume=56&pages=3088-3104
[9]
Yang
N,
Yeoh
P L,
Elkashlan
M.
Transmit antenna selection for security enhancement in MIMO wiretap channels.
IEEE Trans Commun,
2013, 61: 144-154
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Transmit antenna selection for security enhancement in MIMO wiretap channels&author=Yang N&author=Yeoh P L&author=Elkashlan M&publication_year=2013&journal=IEEE Trans Commun&volume=61&pages=144-154
[10]
Zou Y L, Zhu J, Wang X B, et al. Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw, 2015, 29: 42--48.
Google Scholarhttp://scholar.google.com/scholar_lookup?title=Zou Y L, Zhu J, Wang X B, et al. Improving physical-layer security in wireless communications using diversity techniques. IEEE Netw, 2015, 29: 42--48&
[11]
Chen X M, Zhong C J, Yuen C, et al. Multi-antenna relay aided wireless physical layer security. IEEE Commun Mag, 2015, 53: 40--46.
Google Scholarhttp://scholar.google.com/scholar_lookup?title=Chen X M, Zhong C J, Yuen C, et al. Multi-antenna relay aided wireless physical layer security. IEEE Commun Mag, 2015, 53: 40--46&
[12]
Krikidis
I.
Opportunistic relay selection for cooperative networks with secrecy constraints.
IET Commun,
2010, 4: 1787-1791
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Opportunistic relay selection for cooperative networks with secrecy constraints&author=Krikidis I&publication_year=2010&journal=IET Commun&volume=4&pages=1787-1791
[13]
Wang
W,
Teh
K C,
Li
K H.
Generalized Relay Selection for Improved Security in Cooperative DF Relay Networks.
IEEE Wireless Commun Lett,
2016, 5: 28-31
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Generalized Relay Selection for Improved Security in Cooperative DF Relay Networks&author=Wang W&author=Teh K C&author=Li K H&publication_year=2016&journal=IEEE Wireless Commun Lett&volume=5&pages=28-31
[14]
Liu
Y,
Wang
L,
Duy
T T.
Relay Selection for Security Enhancement in Cognitive Relay Networks.
IEEE Wireless Commun Lett,
2015, 4: 46-49
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Relay Selection for Security Enhancement in Cognitive Relay Networks&author=Liu Y&author=Wang L&author=Duy T T&publication_year=2015&journal=IEEE Wireless Commun Lett&volume=4&pages=46-49
[15]
Zou
Y,
Wang
X,
Shen
W.
Optimal relay selection for physical-layer security in cooperative wireless networks.
IEEE J Select Areas Commun,
2013, 31: 2099-2111
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Optimal relay selection for physical-layer security in cooperative wireless networks&author=Zou Y&author=Wang X&author=Shen W&publication_year=2013&journal=IEEE J Select Areas Commun&volume=31&pages=2099-2111
[16]
Zhao R, Lin H X, He Y C, et al. Secrecy performance analysis of MIMO decode-and-forward relay systems in Nakagami-$m$ channels. J Electron Inf Technol, 2016, 38: 1913--1919 .
Google Scholarhttp://scholar.google.com/scholar_lookup?title=Zhao R, Lin H X, He Y C, et al. Secrecy performance analysis of MIMO decode-and-forward relay systems in Nakagami-$m$ channels. J Electron Inf Technol, 2016, 38: 1913--1919 &
[17]
Laneman
J N,
Tse
D N C,
Wornell
G W.
Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior.
IEEE Trans Inform Theor,
2004, 50: 3062-3080
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior&author=Laneman J N&author=Tse D N C&author=Wornell G W&publication_year=2004&journal=IEEE Trans Inform Theor&volume=50&pages=3062-3080
[18]
Zhao H, Pan G F. Analysis of secure communications for a DF and RF relaying SIMO system with Gauss errors. Sci Sin Inform, 2016, 43: 350--360 .
Google Scholarhttp://scholar.google.com/scholar_lookup?title=Zhao H, Pan G F. Analysis of secure communications for a DF and RF relaying SIMO system with Gauss errors. Sci Sin Inform, 2016, 43: 350--360 &
[19]
Wang D Y, Zhao H, Pan G F. An analysis of secrecy outage performance of DF and RD relaying SIMO system with imperfect CSI. Sci Sin Inform, 2016, 46: 925--936 .
Google Scholarhttp://scholar.google.com/scholar_lookup?title=Wang D Y, Zhao H, Pan G F. An analysis of secrecy outage performance of DF and RD relaying SIMO system with imperfect CSI. Sci Sin Inform, 2016, 46: 925--936 &
[20]
Zhang
X,
Zhang
Y,
Yan
Z.
Performance Analysis of Cognitive Relay Networks Over Nakagami-$m$ Fading Channels.
IEEE J Select Areas Commun,
2015, 33: 865-877
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Performance Analysis of Cognitive Relay Networks Over Nakagami-$m$ Fading Channels&author=Zhang X&author=Zhang Y&author=Yan Z&publication_year=2015&journal=IEEE J Select Areas Commun&volume=33&pages=865-877
[21]
Bloch
M,
Barros
J,
Rodrigues
M R D.
Wireless information-theoretic security.
IEEE Trans Inform Theor,
2008, 54: 2515-2534
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Wireless information-theoretic security&author=Bloch M&author=Barros J&author=Rodrigues M R D&publication_year=2008&journal=IEEE Trans Inform Theor&volume=54&pages=2515-2534
[22]
Wang
L,
Elkashlan
M,
Huang
J.
Secure Transmission With Antenna Selection in MIMO Nakagami-$m$ Fading Channels.
IEEE Trans Wireless Commun,
2014, 13: 6054-6067
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Secure Transmission With Antenna Selection in MIMO Nakagami-$m$ Fading Channels&author=Wang L&author=Elkashlan M&author=Huang J&publication_year=2014&journal=IEEE Trans Wireless Commun&volume=13&pages=6054-6067
[23]
Bletsas
A,
Khisti
A,
Reed
D P.
A simple cooperative diversity method based on network path selection.
IEEE J Select Areas Commun,
2006, 24: 659-672
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=A simple cooperative diversity method based on network path selection&author=Bletsas A&author=Khisti A&author=Reed D P&publication_year=2006&journal=IEEE J Select Areas Commun&volume=24&pages=659-672
[24]
Zhao
H,
Tan
Y,
Pan
G.
Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks.
IEEE Trans Veh Technol,
2016, 65: 10236-10242
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Secrecy Outage on Transmit Antenna Selection/Maximal Ratio Combining in MIMO Cognitive Radio Networks&author=Zhao H&author=Tan Y&author=Pan G&publication_year=2016&journal=IEEE Trans Veh Technol&volume=65&pages=10236-10242
[25]
Gradshteyn I S, Ryzhik I M. Table of Integrals, Series, and Products. 7th ed. New York: Academic Press, 2007.
Google Scholarhttp://scholar.google.com/scholar_lookup?title=Gradshteyn I S, Ryzhik I M. Table of Integrals, Series, and Products. 7th ed. New York: Academic Press, 2007&
[26]
Lei
H,
Gao
C,
Ansari
I S.
Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels.
IEEE Trans Veh Technol,
2017, 66: 2237-2250
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Secrecy Outage Performance of Transmit Antenna Selection for MIMO Underlay Cognitive Radio Systems Over Nakagami- $m$ Channels&author=Lei H&author=Gao C&author=Ansari I S&publication_year=2017&journal=IEEE Trans Veh Technol&volume=66&pages=2237-2250
[27]
Yang
N,
Elkashlan
M,
Yeoh
P L.
Multiuser MIMO relay networks in Nakagami-$m$ fading channels.
IEEE Trans Commun,
2012, 60: 3298-3310
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Multiuser MIMO relay networks in Nakagami-$m$ fading channels&author=Yang N&author=Elkashlan M&author=Yeoh P L&publication_year=2012&journal=IEEE Trans Commun&volume=60&pages=3298-3310
[28]
Boyd S, Vandenberghe L. Convex Optimization. Cambridge: Cambridge University Press, 2004.
Google Scholarhttp://scholar.google.com/scholar_lookup?title=Boyd S, Vandenberghe L. Convex Optimization. Cambridge: Cambridge University Press, 2004&
[29]
Lei
H,
Ansari
I S,
Pan
G.
Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels.
IEEE Commun Lett,
2017, 21: 1445-1448
CrossRefGoogle Scholarhttp://scholar.google.com/scholar_lookup?title=Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels&author=Lei H&author=Ansari I S&author=Pan G&publication_year=2017&journal=IEEE Commun Lett&volume=21&pages=1445-1448