{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:08:39Z","timestamp":1769825319444,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T00:00:00Z","timestamp":1452124800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s11432-015-5342-6","type":"journal-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T04:15:30Z","timestamp":1452140130000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints","\u591a\u7528\u6237MISO\u7cfb\u7edf\u4e2d\u57fa\u4e8e\u6982\u7387QoS\u7ea6\u675f\u7684\u9c81\u68d2\u5b89\u5168\u4f20\u8f93"],"prefix":"10.1007","volume":"59","author":[{"given":"Lijian","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Liang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Wenyu","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Chunming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yanqun","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,7]]},"reference":[{"key":"5342_CR1","first-page":"012110","volume":"58","author":"SQ Jiang","year":"2015","unstructured":"Jiang SQ. Ont-time secure key agreement. Sci China Inf Sci, 2015, 58: 012110","journal-title":"Sci China Inf Sci"},{"key":"5342_CR2","first-page":"082113","volume":"56","author":"L Ni","year":"2013","unstructured":"Ni L, Chen G L, Li J H, et al. Strongly secure identity-based authenticated key agreement protocols in the escrow mode. Sci China Inf Sci, 2013, 56: 082113","journal-title":"Sci China Inf Sci"},{"key":"5342_CR3","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A D Wyner","year":"1975","unstructured":"Wyner A D. The wire-tap channel. Bell Syst Tech J, 1975, 54: 1355\u20131387","journal-title":"Bell Syst Tech J"},{"key":"5342_CR4","doi-asserted-by":"crossref","first-page":"2329","DOI":"10.1109\/TWC.2008.070044","volume":"7","author":"Z Zhang","year":"2008","unstructured":"Zhang Z, Zhang W, Tellambura C. MIMO-OFDM channel estimation in the presence of frequency offsets. IEEE Trans Wirel Commun, 2008, 7: 2329\u20132339","journal-title":"IEEE Trans Wirel Commun"},{"key":"5342_CR5","doi-asserted-by":"crossref","first-page":"2704","DOI":"10.1109\/TSP.2013.2253771","volume":"61","author":"Q Li","year":"2013","unstructured":"Li Q, Ma W K. Spatially selective artificial-noise aided transmit optimization for MISO multi-Eves secrecy rate maximization. IEEE Trans Signal Process, 2013, 61: 2704\u20132717","journal-title":"IEEE Trans Signal Process"},{"key":"5342_CR6","first-page":"042308","volume":"58","author":"B Wang","year":"2015","unstructured":"Wang B, Mu P C, Yang P Z, et al. Two-step transmission with artificial noise for secure wireless SIMO communications. Sci China Inf Sci, 2015, 58: 042308","journal-title":"Sci China Inf Sci"},{"key":"5342_CR7","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1109\/TIFS.2014.2327480","volume":"9","author":"H M Wang","year":"2014","unstructured":"Wang H M, Liu F, Xia X G. Joint source-relay precoding and power allocation for secure amplify-and-forward MIMO relay networks. IEEE Trans Inf Forens Secur, 2014, 9: 1240\u20131250","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"5342_CR8","doi-asserted-by":"crossref","first-page":"1850","DOI":"10.1109\/TSP.2014.2303422","volume":"62","author":"L Liu","year":"2014","unstructured":"Liu L, Zhang R, Chua K C. Secrecy wireless information and power transfer with MISO beamforming. IEEE Trans Signal Process, 2014, 62: 1850\u20131863","journal-title":"IEEE Trans Signal Process"},{"key":"5342_CR9","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1109\/TSP.2013.2258016","volume":"61","author":"J Wang","year":"2013","unstructured":"Wang J, Bengtsson M, Ottersten B, et al. Robust MIMO precoding for several classes of channel uncertainty. IEEE Trans Signal Process, 2013, 61: 3056\u20133070","journal-title":"IEEE Trans Signal Process"},{"key":"5342_CR10","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.1109\/LCOMM.2013.100713.131673","volume":"17","author":"Y Tang","year":"2013","unstructured":"Tang Y, Xiong J, Ma D, et al. Robust artificial noise aided transmit design for MISO wiretap channels with channel uncertainty. IEEE Commun Lett, 2013, 17: 2096\u20132099","journal-title":"IEEE Commun Lett"},{"key":"5342_CR11","doi-asserted-by":"crossref","first-page":"3892","DOI":"10.1109\/TSP.2012.2192111","volume":"60","author":"J Li","year":"2012","unstructured":"Li J, Petropulu A P. Explicit solution of worst-case secrecy rate for MISO wiretap channels with spherical uncertainty. IEEE Trans Signal Process, 2012, 60: 3892\u20133895","journal-title":"IEEE Trans Signal Process"},{"key":"5342_CR12","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/LCOMM.2014.012714.132836","volume":"18","author":"X Guan","year":"2014","unstructured":"Guan X, Cai Y, Yang W. On the reliability-security tradeoff and secrecy throughput in cooperative ARQ. IEEE Commun Lett, 2014, 18: 479\u2013482","journal-title":"IEEE Commun Lett"},{"key":"5342_CR13","doi-asserted-by":"crossref","first-page":"1637","DOI":"10.1109\/LCOMM.2014.2345669","volume":"18","author":"Y Cai","year":"2014","unstructured":"Cai Y, Guan X, Yang W. Secure transmission design and performance analysis for cooperation exploring outdated CSI. IEEE Commun Lett, 2014, 18: 1637\u20131640","journal-title":"IEEE Commun Lett"},{"key":"5342_CR14","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TIFS.2013.2296991","volume":"9","author":"L Wang","year":"2014","unstructured":"Wang L, Yang N, Elkashlan M, et al. Physical layer security of maximal ratio combining in two-wave with diffuse power fading channels. IEEE Trans Inf Forens Secur, 2014, 9: 247\u2013258","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"5342_CR15","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/LSP.2013.2293884","volume":"21","author":"Q Li","year":"2014","unstructured":"Li Q, Ma W K, So A M C. A safe approximation approach to secrecy outage design for MIMO wiretap channels. IEEE Signal Process Lett, 2014, 21: 118\u2013121","journal-title":"IEEE Signal Process Lett"},{"key":"5342_CR16","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/TWC.2011.120511.110567","volume":"11","author":"M Y Pei","year":"2012","unstructured":"Pei M Y, Wei J B, Wong K K, et al. Masked beamforming for multiuser MIMO wiretap channels with imperfect CSI. IEEE Trans Wirel Commun, 2012, 11: 544\u2013549","journal-title":"IEEE Trans Wirel Commun"},{"key":"5342_CR17","doi-asserted-by":"crossref","first-page":"1728","DOI":"10.1109\/JSAC.2013.130907","volume":"31","author":"P H Lin","year":"2013","unstructured":"Lin P H, Lai S H, Lin S C, et al. On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J Sel Area Commun, 2013, 31: 1728\u20131740","journal-title":"IEEE J Sel Area Commun"},{"key":"5342_CR18","doi-asserted-by":"crossref","first-page":"1202","DOI":"10.1109\/TSP.2010.2094610","volume":"59","author":"W C Liao","year":"2011","unstructured":"Liao W C, Chang T H, Ma W K, et al. QoS-based transmit beamforming in the presence of eavesdroppers: an optimized artificial-noise-aided approach. IEEE Trans Signal Process, 2011, 59: 1202\u20131216","journal-title":"IEEE Trans Signal Process"},{"key":"5342_CR19","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/LSP.2011.2178067","volume":"19","author":"N Romero-Zurita","year":"2012","unstructured":"Romero-Zurita N, Ghogho M, Mc Lernon DC. Outage probability based power distribution between data and artificial noise for physical layer security. IEEE Signal Process Lett, 2012, 19: 71\u201374","journal-title":"IEEE Signal Process Lett"},{"key":"5342_CR20","first-page":"102302","volume":"57","author":"Z S Fei","year":"2014","unstructured":"Fei Z S, Ni J Q, Zhao D, et al. Ergodic secrecy rate of two-user MISO interference channels with statistical CSI. Sci China Inf Sci, 2014, 57: 102302","journal-title":"Sci China Inf Sci"},{"key":"5342_CR21","doi-asserted-by":"crossref","first-page":"1928","DOI":"10.1007\/s11432-011-4380-y","volume":"54","author":"Y Xu","year":"2011","unstructured":"Xu Y, Wang J, Wu Q. Effective capacity region of two-user opportunistic spectrum access. Sci China Inf Sci, 2011, 54: 1928\u20131937","journal-title":"Sci China Inf Sci"},{"key":"5342_CR22","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel S, Negi R. Guaranteeing secrecy using artificial noise. IEEE Trans Wirel Commun, 2008, 7: 2180\u20132189","journal-title":"IEEE Trans Wirel Commun"},{"key":"5342_CR23","doi-asserted-by":"crossref","first-page":"3831","DOI":"10.1109\/TVT.2010.2059057","volume":"59","author":"X M Zhou","year":"2010","unstructured":"Zhou X, Mc Kay M R. Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation. IEEE Trans Veh Technol, 2010, 59: 3831\u20133842","journal-title":"IEEE Trans Veh Technol"},{"key":"5342_CR24","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MSP.2010.936019","volume":"27","author":"Z Q Luo","year":"2010","unstructured":"Luo Z Q, Ma W K, So A C, et al. Semidefinite relaxation of quadratic optimization problems. IEEE Signal Process Mag, 2010, 27: 20\u201334","journal-title":"IEEE Signal Process Mag"},{"key":"5342_CR25","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/LCOMM.2012.112812.121829","volume":"17","author":"S Ma","year":"2013","unstructured":"Ma S, Sun D. Chance constrained robust beamforming in cognitive radio networks. IEEE Commun Lett, 2013, 17: 67\u201370","journal-title":"IEEE Commun Lett"},{"key":"5342_CR26","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S Boyd","year":"2004","unstructured":"Boyd S, Vandenberghe L. Convex Optimization. Cambridge: Cambridge University Press, 2004"},{"key":"5342_CR27","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1109\/ACSSC.2011.6189986","volume-title":"Proceedings of 2011 Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers (ASILOMAR), Pacific Grove","author":"Q Li","year":"2011","unstructured":"Li Q, Ma W K, So A C. Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise. In: Proceedings of 2011 Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers (ASILOMAR), Pacific Grove, 2011. 207\u2013211"},{"key":"5342_CR28","volume-title":"CVX: Matlab software for disciplined convex programming","author":"M Grant","year":"2012","unstructured":"Grant M, Boyd S. CVX: Matlab software for disciplined convex programming. version 2.0. http:\/\/cvxr.com\/cvx, 2012"},{"key":"5342_CR29","first-page":"23","volume-title":"Proceedings of European Signal Processing Conference (EUSIPCO), Aalborg","author":"K Y Wang","year":"2010","unstructured":"Wang K Y, Chang T H, Ma W K, et al. A semidefinite relaxation based conservative approach to robust transmit beamforming with probabilistic SINR constraints. In: Proceedings of European Signal Processing Conference (EUSIPCO), Aalborg, 2010. 23\u201327"},{"key":"5342_CR30","volume-title":"Probability, Statistics, and Random Processes for Electrical Engineering","author":"A Leon-Garcia","year":"2008","unstructured":"Leon-Garcia A. Probability, Statistics, and Random Processes for Electrical Engineering. Upper Saddle River: Pearson Education Inc., 2008"},{"key":"5342_CR31","doi-asserted-by":"crossref","DOI":"10.1137\/1.9780898718829","volume-title":"Lectures on Modern Convex Optimization: Analysis, Algorithms, and Engineering Applications","author":"A Ben-Tal","year":"2001","unstructured":"Ben-Tal A, Nemirovski A. Lectures on Modern Convex Optimization: Analysis, Algorithms, and Engineering Applications. Philadelphia: SIAM, 2001"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5342-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5342-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5342-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:38:02Z","timestamp":1559389082000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5342-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,7]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["5342"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5342-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,7]]}}}