{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:56:48Z","timestamp":1761663408493},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T00:00:00Z","timestamp":1441584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s11432-015-5401-z","type":"journal-article","created":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T13:09:04Z","timestamp":1441631344000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Cooperative beamforming design for physical-layer security of multi-hop MIMO communications"],"prefix":"10.1007","volume":"59","author":[{"given":"Shiqi","family":"Gong","sequence":"first","affiliation":[]},{"given":"Chengwen","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Zesong","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Jingming","family":"Kuang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,7]]},"reference":[{"key":"5401_CR1","doi-asserted-by":"crossref","first-page":"2273","DOI":"10.1109\/TSP.2009.2038961","volume":"58","author":"C W Xing","year":"2010","unstructured":"Xing C W, Ma S D, Wu Y C. Robust joint design of linear relay precoder and destination equalizer for dual-hop amplify-and-forward MIMO relay systems. IEEE Trans Signal Process, 2010, 58: 2273\u20132283","journal-title":"IEEE Trans Signal Process"},{"key":"5401_CR2","doi-asserted-by":"crossref","first-page":"6068","DOI":"10.1109\/TWC.2009.12.090379","volume":"8","author":"Y Rong","year":"2009","unstructured":"Rong Y, Hua Y. Optimality of diagonalization of multi-hop MIMO relays. IEEE Trans Wirel Commun, 2009, 8: 6068\u20136077","journal-title":"IEEE Trans Wirel Commun"},{"key":"5401_CR3","doi-asserted-by":"crossref","first-page":"1370","DOI":"10.1109\/JSAC.2012.120907","volume":"30","author":"C W Xing","year":"2012","unstructured":"Xing C W, Xia M, Gao F, et al. Robust transceiver with Tomlinson-Harashima precoding for amplify-and-forward MIMO relaying systems. IEEE J Sele Area Commun, 2012, 30: 1370\u20131382","journal-title":"IEEE J Sele Area Commun"},{"key":"5401_CR4","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1002\/ett.4460100604","volume":"10","author":"I E Telatar","year":"1999","unstructured":"Telatar I E. Capacity of multi-antenna gaussian channels. Eur Trans Telecommun, 1999, 10: 585\u2013595","journal-title":"Eur Trans Telecommun"},{"key":"5401_CR5","doi-asserted-by":"crossref","first-page":"6391","DOI":"10.1109\/TSP.2014.2364786","volume":"62","author":"F Zhu","year":"2014","unstructured":"Zhu F, Gao F, Yao M, et al. Joint information and jamming beamforming for physical layer security with full duplex base station. IEEE Trans Signal Process, 2014, 62: 6391\u20136401","journal-title":"IEEE Trans Signal Process"},{"key":"5401_CR6","first-page":"905","volume-title":"Proceedings of 41st Conf Inf Sci Syst, Baltimore","author":"Z Li","year":"2007","unstructured":"Li Z, Trappe W, Yates R. Secret communication via multi-antenna transmission. In: Proceedings of 41st Conf Inf Sci Syst, Baltimore, 2007. 905\u2013910"},{"key":"5401_CR7","first-page":"546260","volume":"2013","author":"J Q Ni","year":"2013","unstructured":"Ni J Q, Fei Z S, Xing C W, et al. Secrecy balancing over two-user MISO interference channels with rician fading. Int J Antenn Propag, 2013, 2013: 546260","journal-title":"Int J Antenn Propag"},{"key":"5401_CR8","first-page":"3372","volume-title":"Proceedings of IEEE Int Conf Acoustics, Speech, and Signal Processing, Prague","author":"J Lindblom","year":"2011","unstructured":"Lindblom J, Karipidis E. Closed-form parameterization of the pareto boundary for the two-user MISO interference channel. In: Proceedings of IEEE Int Conf Acoustics, Speech, and Signal Processing, Prague, 2011. 3372\u20133375"},{"key":"5401_CR9","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/LCOMM.2011.011811.101720","volume":"15","author":"L Chen","year":"2011","unstructured":"Chen L, Wong K K, Chen H. Optimizing transmitter-receiver collaborative-relay beamforming with perfect CSI. IEEE Commun Lett, 2011, 15: 314\u2013316","journal-title":"IEEE Commun Lett"},{"key":"5401_CR10","first-page":"1","volume-title":"Proceedings of IEEE Vehicular Technology Conference, Las Vegas","author":"C Wang","year":"2013","unstructured":"Wang C, Liu J, Dong Z. Multi-hop collaborative relay beamforming. In: Proceedings of IEEE Vehicular Technology Conference, Las Vegas, 2013. 1\u20135"},{"key":"5401_CR11","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C E Shannon","year":"1949","unstructured":"Shannon C E. Communication theory of secrecy systems. Bell Syst Tech J, 1949, 28: 656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"5401_CR12","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A D Wyner","year":"1975","unstructured":"Wyner A D. The wire-tap channel. Bell Sys Tech J, 1975, 54: 1355\u20131387","journal-title":"Bell Sys Tech J"},{"key":"5401_CR13","first-page":"393","volume-title":"Proceedings of ISITA, Melbourne","author":"B Dai","year":"2014","unstructured":"Dai B, Ma Z. Achievable rate-equivocation regions for relay broadcast channels with confidential messages. In: Proceedings of ISITA, Melbourne, 2014. 393\u2013397"},{"key":"5401_CR14","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong S, Hellman M E. The Gaussian wire-tap channel. IEEE Trans Inf Theory, 1978, 24: 451\u2013456","journal-title":"IEEE Trans Inf Theory"},{"key":"5401_CR15","first-page":"1","volume-title":"Proceedings of international ITG workshop on smart Antennas, Berlin","author":"A E Jorswieck","year":"2009","unstructured":"Jorswieck A E, Mochaourab R. Secrecy rate region of MISO interference channel: pareto boundary and non-cooperative games. In: Proceedings of international ITG workshop on smart Antennas, Berlin, 2009. 1\u20138"},{"key":"5401_CR16","first-page":"102302","volume":"57","author":"Z S Fei","year":"2014","unstructured":"Fei Z S, Ni J Q, Zhao D, et al. Ergodic secrecy rate of two-user MISO interference channels with statistical CSI. Sci China Inf Sci, 2014, 57: 102302","journal-title":"Sci China Inf Sci"},{"key":"5401_CR17","first-page":"1280","volume-title":"Proceedings of Globecom Workshops, Atlanta","author":"P C Mu","year":"2013","unstructured":"Mu P C, Wang H M, Yin Q Y. Improving the secrecy rate of wireless SIMO systems via two-step transmission. In: Proceedings of Globecom Workshops, Atlanta, 2013. 1280\u20131285"},{"key":"5401_CR18","doi-asserted-by":"crossref","first-page":"1616","DOI":"10.1109\/TWC.2013.122313.131118","volume":"13","author":"Y W Wang","year":"2014","unstructured":"Wang Y W, Yu F R, Tang H, et al. A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Trans Wirel Commun, 2014, 13: 1616\u20131627","journal-title":"IEEE Trans Wirel Commun"},{"key":"5401_CR19","doi-asserted-by":"crossref","first-page":"3090","DOI":"10.1109\/TWC.2012.072512.110476","volume":"11","author":"T Luan","year":"2012","unstructured":"Luan T, Gao F, Zhang X. Joint resource scheduling for relay-assisted broadband cognitive radio networks. IEEE Trans Wirel Commun, 2012, 11: 3090\u20133100","journal-title":"IEEE Trans Wirel Commun"},{"key":"5401_CR20","first-page":"5","volume-title":"Proceedings of Global Telecommunications Conference, Houston","author":"H M Wang","year":"2011","unstructured":"Wang H M, Yin Q Y. Improving the physical-layer security of wireless two-way relaying via analog network coding. In: Proceedings of Global Telecommunications Conference, Houston, 2011. 5\u20139"},{"key":"5401_CR21","doi-asserted-by":"crossref","first-page":"2007","DOI":"10.1109\/TIFS.2013.2287046","volume":"8","author":"H M Wang","year":"2013","unstructured":"Wang H M, Luo M, Yin Q Y. Hybrid cooperative beamforming and jamming for physical-layer security of two-way relay networks. IEEE Trans Inf Foren Secur, 2013, 8: 2007\u20132020","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"5401_CR22","doi-asserted-by":"crossref","first-page":"5515","DOI":"10.1109\/TIT.2010.2068852","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti A, Wornell G. Secure transmission with multiple antennas II: the MIMOME wiretap channel. IEEE Trans Inf Theory, 2010, 56: 5515\u20135532","journal-title":"IEEE Trans Inf Theory"},{"key":"5401_CR23","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1109\/TIT.2008.921680","volume":"54","author":"E Tekin","year":"2008","unstructured":"Tekin E, Yener A. The general gaussian multiple access and two-way wire-tap channels: achievable rates and cooperative jamming. IEEE Trans Inf Theory, 2008, 54: 2735\u20132751","journal-title":"IEEE Trans Inf Theory"},{"key":"5401_CR24","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/SURV.2013.062613.00014","volume":"16","author":"Z Zhang","year":"2014","unstructured":"Zhang Z, Long K, Wang J, et al. On swarm intelligence inspired self-organized networking: its bionic mechanisms, designing principles and optimization approaches. IEEE Commun Surv Tut, 2014, 16: 513\u2013537","journal-title":"IEEE Commun Surv Tut"},{"key":"5401_CR25","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MWC.2013.6507392","volume":"20","author":"Z Zhang","year":"2013","unstructured":"Zhang Z, Long K, Wang J. Self-organization paradigms and optimization approaches for cognitive radio technologies: a survey. IEEE Wirel Commun, 2013, 20: 36\u201342","journal-title":"IEEE Wirel Commun"},{"key":"5401_CR26","first-page":"1","volume-title":"Proceedings of IEEE Int Conf CONECCT, Bangalore","author":"G Vaikundam","year":"2013","unstructured":"Vaikundam G, Sudha G F. Distributed beamforming for randomly distributed sensors using bisection method and dynamic programming technique. In: Proceedings of IEEE Int Conf CONECCT, Bangalore, 2013. 1\u20136"},{"key":"5401_CR27","volume-title":"CVX Users\u2019 Guide for CVX version 1.21","author":"G Michael","year":"1996","unstructured":"Michael G, Stephen B. CVX Users\u2019 Guide for CVX version 1.21, 1996"},{"key":"5401_CR28","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/JCN.2010.6388487","volume":"12","author":"E Ekrem","year":"2010","unstructured":"Ekrem E, Ulukus S. Secure broadcasting using multiple antennas. J Commun Netw, 2010, 12: 411\u2013432","journal-title":"J Commun Netw"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5401-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5401-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5401-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:38:03Z","timestamp":1559403483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5401-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,7]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["5401"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5401-z","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,7]]},"article-number":"062304"}}