{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:30:27Z","timestamp":1743006627301,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030218027"},{"type":"electronic","value":"9783030218034"}],"license":[{"start":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T00:00:00Z","timestamp":1560556800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-21803-4_30","type":"book-chapter","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T22:03:24Z","timestamp":1560549804000},"page":"289-298","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A DCA-Based Approach for Outage Constrained Robust Secure Power-Splitting SWIPT MISO System"],"prefix":"10.1007","author":[{"given":"Phuong Anh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Hoai An","family":"Le Thi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,15]]},"reference":[{"issue":"2","key":"30_CR1","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1109\/TIFS.2017.2746063","volume":"13","author":"D Chen","year":"2018","unstructured":"Chen, D., He, Y., Lin, X., Zhao, R.: Both worst-case and chance-constrained robust secure SWIPT in MISO interference channels. IEEE Trans. Inf. Forensics Secur. 13(2), 306\u2013317 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"30_CR2","doi-asserted-by":"crossref","first-page":"1571","DOI":"10.1109\/LCOMM.2016.2572684","volume":"20","author":"Z Chu","year":"2016","unstructured":"Chu, Z., Zhu, Z., Hussein, J.: Robust optimization for an-aided transmission and power splitting for secure MISO SWIPT system. IEEE Commun. Lett. 20(8), 1571\u20131574 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"3","key":"30_CR3","doi-asserted-by":"crossref","first-page":"2354","DOI":"10.1109\/TVT.2016.2578313","volume":"66","author":"Y Feng","year":"2017","unstructured":"Feng, Y., Yang, Z., Zhu, W., Li, Q., Lv, B.: Robust cooperative secure beamforming for simultaneous wireless information and power transfer in amplify-and-forward relay networks. IEEE Trans. Veh. Technol. 66(3), 2354\u20132366 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"30_CR4","doi-asserted-by":"crossref","first-page":"2852","DOI":"10.1109\/TVT.2010.2049868","volume":"59","author":"EA Gharavol","year":"2010","unstructured":"Gharavol, E.A., Liang, Y., Mouthaan, K.: Robust downlink beamforming in multiuser MISO cognitive radio networks with imperfect channel-state information. IEEE Trans. Veh. Technol. 59(6), 2852\u20132860 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"30_CR5","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1109\/TIFS.2016.2611478","volume":"12","author":"MRA Khandaker","year":"2017","unstructured":"Khandaker, M.R.A., Wong, K., Zhang, Y., Zheng, Z.: Probabilistically robust SWIPT for secrecy misome systems. IEEE Trans. Inf. Forensics Secur. 12(1), 211\u2013226 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"30_CR6","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/MCOM.2014.6957150","volume":"52","author":"I Krikidis","year":"2014","unstructured":"Krikidis, I., Timotheou, S., Nikolaou, S., Zheng, G., Ng, D.W.K., Schober, R.: Simultaneous wireless information and power transfer in modern communication systems. IEEE Commun. Mag. 52(11), 104\u2013110 (2014)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"30_CR7","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1109\/TGCN.2017.2706063","volume":"1","author":"TA Le","year":"2017","unstructured":"Le, T.A., Vien, Q., Nguyen, H.X., Ng, D.W.K., Schober, R.: Robust chance-constrained optimization for power-efficient and secure SWIPT systems. IEEE Trans. Green Commun. Netw. 1(3), 333\u2013346 (2017)","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Le Thi, H.A., Huynh, V.N., Pham Dinh, T.: Dc programming and DCA for general dc programs. In: Advanced Computational Methods for Knowledge Engineering, pp. 15\u201335 (2014)","DOI":"10.1007\/978-3-319-06569-4_2"},{"key":"30_CR9","unstructured":"Le Thi, H.A., Le, H.M., Phanand, B.,Tran, D.N.: A DCA-like algorithm and its accelerated version with application in data visualization (2018). CoRR \n                    arXiv:abs\/1806.09620"},{"issue":"1","key":"30_CR10","first-page":"23","volume":"133","author":"HA Thi Le","year":"2005","unstructured":"Le Thi, H.A., Pham Dinh, T.: The DC (difference of convex functions) programming and DCA revisited with dc models of real world nonconvex optimization problems. Ann. Oper. Res. 133(1), 23\u201346 (2005)","journal-title":"Ann. Oper. Res."},{"issue":"1","key":"30_CR11","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10107-018-1235-y","volume":"169","author":"HA Thi Le","year":"2018","unstructured":"Le Thi, H.A., Pham Dinh, T.: DC programming and DCA: thirty years of developments. Math. Program. 169(1), 5\u201368 (2018)","journal-title":"Math. Program."},{"issue":"6","key":"30_CR12","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1109\/LCOMM.2017.2669976","volume":"21","author":"H Lei","year":"2017","unstructured":"Lei, H., Ansari, I.S., Pan, G., Alomair, B., Alouini, M.: Secrecy capacity analysis over \n                    \n                      \n                    \n                    $$\\alpha - \\mu $$\n                   fading channels. IEEE Commun. Lett. 21(6), 1445\u20131448 (2017)","journal-title":"IEEE Commun. Lett."},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Li, Q., Ma, W.: Secrecy rate maximization of a MISO channelwith multiple multi-antenna eavesdroppers via semidefinite programming. In: 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3042\u20133045 (2010)","DOI":"10.1109\/ICASSP.2010.5496122"},{"issue":"10","key":"30_CR14","doi-asserted-by":"crossref","first-page":"5558","DOI":"10.1109\/TWC.2014.2326415","volume":"13","author":"S Ma","year":"2014","unstructured":"Ma, S., Hong, M., Song, E., Wang, X., Sun, D.: Outage constrained robust secure transmission for MISO wiretap channels. IEEE Trans. Wirel. Commun. 13(10), 5558\u20135570 (2014)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"30_CR15","unstructured":"Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to D.C. programming: theory, algorithm and applications. Acta Math. Vietnam. 22(1), 289\u2013355 (1997)"},{"key":"30_CR16","unstructured":"Pham Dinh, T., Le Thi, H.A.: D.C. optimization algorithms for solving the trust region subproblem. SIAM J. Optim. 8(2), 476\u2013505 (1998)"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Pham Dinh, T., Le Thi, H.A.: Recent advances in DC programming and DCA. In: Transactions on Computational Intelligence XIII. pp. 1\u201337. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-642-54455-2_1"},{"issue":"2","key":"30_CR18","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TCOMM.2013.122013.130239","volume":"62","author":"U Rashid","year":"2014","unstructured":"Rashid, U., Tuan, H.D., Kha, H.H., Nguyen, H.H.: Joint optimization of source precoding and relay beamforming in wireless mimo relay networks. IEEE Trans. Commun. 62(2), 488\u2013499 (2014)","journal-title":"IEEE Trans. Commun."},{"issue":"6","key":"30_CR19","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1109\/LSP.2014.2368695","volume":"22","author":"M Tian","year":"2015","unstructured":"Tian, M., Huang, X., Zhang, Q., Qin, J.: Robust an-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett. 22(6), 723\u2013727 (2015)","journal-title":"IEEE Signal Process. Lett."},{"issue":"21","key":"30_CR20","doi-asserted-by":"crossref","first-page":"5690","DOI":"10.1109\/TSP.2014.2354312","volume":"62","author":"K Wang","year":"2014","unstructured":"Wang, K., So, A.M., Chang, T., Ma, W., Chi, C.: Outage constrained robust transmit optimization for multiuser MISO downlinks: tractable approximations by conic optimization. IEEE Trans. Signal Process. 62(21), 5690\u20135705 (2014)","journal-title":"IEEE Trans. Signal Process."},{"issue":"11","key":"30_CR21","doi-asserted-by":"crossref","first-page":"2147","DOI":"10.1109\/LSP.2015.2464791","volume":"22","author":"S Wang","year":"2015","unstructured":"Wang, S., Wang, B.: Robust secure transmit design in mimo channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett. 22(11), 2147\u20132151 (2015)","journal-title":"IEEE Signal Process. Lett."}],"container-title":["Advances in Intelligent Systems and Computing","Optimization of Complex Systems: Theory, Models, Algorithms and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-21803-4_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T05:46:03Z","timestamp":1572587163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-21803-4_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,15]]},"ISBN":["9783030218027","9783030218034"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-21803-4_30","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,6,15]]},"assertion":[{"value":"15 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WCGO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Congress on Global Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Metz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wcgo2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}