{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:23:08Z","timestamp":1740140588034,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61371075"],"award-info":[{"award-number":["61371075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61421001"],"award-info":[{"award-number":["61421001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"111 Project of China"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0560-1","type":"journal-article","created":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T20:07:23Z","timestamp":1456776443000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Robust beamforming and cooperative jamming for secure transmission in DF relay systems"],"prefix":"10.1186","volume":"2016","author":[{"given":"Bin","family":"Li","sequence":"first","affiliation":[]},{"given":"Zesong","family":"Fei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,1]]},"reference":[{"issue":"6","key":"560_CR1","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y Liang","year":"2008","unstructured":"Y Liang, HV Poor, S Shamai, Secure communication over fading channels. IEEE Trans. Inf. Theory. 54(6), 2470\u20132492 (2008).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"560_CR2","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1109\/TWC.2012.070912.110789","volume":"11","author":"M Dehghan","year":"2012","unstructured":"M Dehghan, DL Goeckel, M Ghaderi, Z Ding, Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Trans. Wirel. Commun. 11(9), 3025\u20133029 (2012).","journal-title":"IEEE Trans. Wirel. Commun"},{"issue":"9","key":"560_CR3","doi-asserted-by":"publisher","first-page":"1714","DOI":"10.1109\/JSAC.2013.130906","volume":"31","author":"Q Li","year":"2013","unstructured":"Q Li, M Hong, HT Wai, YF Liu, WK Ma, ZQ Luo, Transmit solutions for MIMO wiretap channels using alternating optimization. IEEE J. Sel. Areas Commun. 31(9), 1714\u20131727 (2013).","journal-title":"IEEE J. Sel. Areas Commun"},{"issue":"33","key":"560_CR4","first-page":"1","volume":"1","author":"AP Shrestha","year":"2014","unstructured":"AP Shrestha, KS Kwak, Performance of opportunistic scheduling for physical layer security with transmit antenna selection. EURASIP J. Wirel. Commun. Netw. 1(33), 1\u20139 (2014).","journal-title":"EURASIP J. Wirel. Commun. Netw"},{"issue":"1","key":"560_CR5","first-page":"42","volume":"29","author":"Y Zou","year":"2015","unstructured":"Y Zou, J Zhu, X Wang, VCM Leung. Improving physical-layer security in wireless communications using diversity techniques.IEEE Netw. 29(1), 42\u201348 (2015).","journal-title":"Improving physical-layer security in wireless communications using diversity techniques.IEEE Netw"},{"issue":"5","key":"560_CR6","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1109\/TVT.2014.2334640","volume":"64","author":"C Wang","year":"2014","unstructured":"C Wang, HM Wang, Robust joint beamforming and jamming for secure AF networks: low-complexity design. IEEE Trans. Veh. Technol. 64(5), 2192\u20132198 (2014).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"12","key":"560_CR7","doi-asserted-by":"publisher","first-page":"5039","DOI":"10.1109\/TCOMM.2015.2494012","volume":"63","author":"TM Hoang","year":"2015","unstructured":"TM Hoang, TQ Duong, HA Suraweera, C Tellambura, HV Poor, Cooperative beamforming and user selection for improving the security of relay-aided systems. IEEE Trans. Commun. 63(12), 5039\u20135051 (2015).","journal-title":"IEEE Trans. Commun"},{"issue":"10","key":"560_CR8","doi-asserted-by":"publisher","first-page":"5013","DOI":"10.1109\/TSP.2011.2161298","volume":"59","author":"SAA Fakoorian","year":"2011","unstructured":"SAA Fakoorian, AL Swindlehurst, Solutions for the MIMO Gaussian wiretap channel with a cooperative jammer. IEEE Trans. Signal Process. 59(10), 5013\u20135022 (2011).","journal-title":"IEEE Trans. Signal Process"},{"issue":"10","key":"560_CR9","doi-asserted-by":"publisher","first-page":"4985","DOI":"10.1109\/TSP.2011.2159598","volume":"59","author":"J Li","year":"2011","unstructured":"J Li, AP Petropulu, S Weber, On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process. 59(10), 4985\u20134997 (2011).","journal-title":"IEEE Trans. Signal Process"},{"key":"560_CR10","doi-asserted-by":"crossref","unstructured":"M Ghaderi, DL Goeckel, A Orda, M Dehghan, in Proceedings of 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). Efficient Wireless Security Through Jamming, Coding and Routing (New Orleans, LA, 2013), pp. 505\u2013513.","DOI":"10.1109\/SAHCN.2013.6645022"},{"issue":"7","key":"560_CR11","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1109\/TMC.2014.2354031","volume":"14","author":"M Ghaderi","year":"2014","unstructured":"M Ghaderi, D Goeckel, A Orda, M Dehghan, Minimum energy routing and jamming to thwart wireless network eavesdroppers. IEEE Trans. Mobile Comput. 14(7), 1433\u20131448 (2014).","journal-title":"IEEE Trans. Mobile Comput"},{"issue":"3","key":"560_CR12","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"L Dong, Z Han, AP Petropulu, HV Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 58(3), 1875\u20131888 (2010).","journal-title":"IEEE Trans. Signal Process"},{"issue":"3","key":"560_CR13","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"G Zheng","year":"2011","unstructured":"G Zheng, LC Choo, KK Wong, Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process. 59(3), 1317\u20131322 (2011).","journal-title":"IEEE Trans. Signal Process"},{"issue":"9","key":"560_CR14","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/JSAC.2013.130907","volume":"31","author":"PH Lin","year":"2013","unstructured":"PH Lin, SH Lai, SC Lin, HJ Su, On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J. Sel. Areas Commun. 31(9), 1728\u20131740 (2013).","journal-title":"IEEE J. Sel. Areas Commun"},{"issue":"10","key":"560_CR15","doi-asserted-by":"publisher","first-page":"2704","DOI":"10.1109\/TSP.2013.2253771","volume":"61","author":"Q Li","year":"2013","unstructured":"Q Li, WK Ma, Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization. IEEE Trans. Signal Process. 61(10), 2704\u20132717 (2013).","journal-title":"IEEE Trans. Signal Process"},{"issue":"5","key":"560_CR16","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1109\/TVT.2014.2336092","volume":"64","author":"Z Chu","year":"2015","unstructured":"Z Chu, K Cumanan, Z Ding, M Johnston, S Le Goff, Secrecy rate optimizations for a MIMO secrecy channel with a cooperative jammer. IEEE Trans. Veh. Technol. 64(5), 1833\u20131847 (2015).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"1","key":"560_CR17","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/LSP.2012.2227313","volume":"20","author":"Y Yang","year":"2013","unstructured":"Y Yang, Q Li, WK Ma, J Ge, PC Ching, Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Process. Lett. 20(1), 35\u201338 (2013).","journal-title":"IEEE Signal Process. Lett"},{"issue":"11","key":"560_CR18","doi-asserted-by":"publisher","first-page":"3461","DOI":"10.1109\/TCOMM.2012.081012.110236","volume":"60","author":"Z Ding","year":"2012","unstructured":"Z Ding, M Peng, HH Chen, A general relaying transmission protocol for MIMO secrecy communications. IEEE Trans. Commun. 60(11), 3461\u20133471 (2012).","journal-title":"IEEE Trans. Commun"},{"key":"560_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/NCC.2014.6811256","volume-title":"Twentieth National Conference on Communications (NCC)","author":"S Vishwakarma","year":"2014","unstructured":"S Vishwakarma, A Chockalingam, in Twentieth National Conference on Communications (NCC). MIMO Decode-and-Forward Relay Beamforming for Secrecy with Cooperative Jamming (IEEEKanpur, 2014), pp. 1\u20136."},{"issue":"5","key":"560_CR20","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TVT.2012.2230657","volume":"62","author":"X Wang","year":"2013","unstructured":"X Wang, K Wang, X Zhang, Secure relay beamforming with imperfect channel state information. IEEE Trans. Veh. Technol. 62(5), 2140\u20132155 (2013).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"4","key":"560_CR21","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1109\/TSP.2011.2182344","volume":"60","author":"J Huang","year":"2012","unstructured":"J Huang, AL Swindlehurst, Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal Process. 60(4), 1696\u20131707 (2012).","journal-title":"IEEE Trans. Signal Process"},{"issue":"9","key":"560_CR22","doi-asserted-by":"publisher","first-page":"1812","DOI":"10.1109\/TIFS.2015.2423263","volume":"10","author":"P Zhao","year":"2015","unstructured":"P Zhao, M Zhang, H Yu, H Luo, W Chen, Robust beamforming design for sum secrecy rate optimization in MU-MISO networks. IEEE Trans. Inf. Forensics Secur. 10(9), 1812\u20131823 (2015).","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"4","key":"560_CR23","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1109\/WCL.2013.050613.130177","volume":"2","author":"J Ni","year":"2013","unstructured":"J Ni, Z Fei, KK Wong, C Xing, J Kuang, K-F Tong, Robust coordinated beamforming for secure MISO interference channels with bounded ellipsoidal uncertainties. IEEE Wirel. Commun. Lett. 2(4), 407\u2013410 (2013).","journal-title":"IEEE Wirel. Commun. Lett"},{"issue":"10","key":"560_CR24","first-page":"1","volume":"57","author":"Z Fei","year":"2014","unstructured":"Z Fei, J Ni, D Zhao, C Xing, N Wang, J Kuang, Ergodic secrecy rate of two-user MISO interference channels with statistical CSI.SCIENCE CHINA Inf. Sci. 57(10), 1\u201314 (2014).","journal-title":"Sci"},{"key":"560_CR25","doi-asserted-by":"crossref","unstructured":"S Vishwakarma, A Chockalingam, in Proceedings of IEEE International Conference on Communications (ICC). Amplify-and-Forward Relay Beamforming for Secrecy with Cooperative Jamming and Imperfect CSI (Budapest, 2013), pp. 3047\u20133052.","DOI":"10.1109\/ICC.2013.6655008"},{"issue":"7","key":"560_CR26","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/TVT.2013.2255898","volume":"62","author":"M Zhang","year":"2013","unstructured":"M Zhang, H Yi, H Yu, H Luo, W Chen, Joint optimization in bidirectional multi-user multi-relay MIMO systems: non-robust and robust cases. IEEE Trans.Veh. Technol. 62(7), 3228\u20133244 (2013).","journal-title":"IEEE Trans.Veh. Technol"},{"issue":"10","key":"560_CR27","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1109\/LCOMM.2014.2334324","volume":"18","author":"Y Qin","year":"2014","unstructured":"Y Qin, M Ding, M Zhang, H Yu, H Luo, Relaying robust beamforming for device-to-device communication with channel uncertainty. IEEE Commun.Lett. 18(10), 1859\u20131862 (2014).","journal-title":"IEEE Commun.Lett"},{"issue":"7","key":"560_CR28","doi-asserted-by":"publisher","first-page":"1458","DOI":"10.1109\/JSAC.2015.2430211","volume":"33","author":"C Liu","year":"2015","unstructured":"C Liu, N Yang, J Yuan, R Malaney, Location-based secure transmission for wiretap channels. IEEE J. Sel. Areas Commun. 33(7), 1458\u20131470 (2015).","journal-title":"IEEE J. Sel. Areas Commun"},{"issue":"5","key":"560_CR29","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/LCOMM.2011.030911.102343","volume":"15","author":"F He","year":"2011","unstructured":"F He, H Man, W Wang, Maximal ratio diversity combining enhanced security. IEEE Commun. Lett. 15(5), 509\u2013511 (2011).","journal-title":"IEEE Commun. Lett"},{"issue":"12","key":"560_CR30","first-page":"6745","volume":"60","author":"MZI Sarkar","year":"2012","unstructured":"MZI Sarkar, T Ratnarajah. Enhancing security in correlated channel with maximal ratio combining diversity.IEEE Trans. on Signal Process. 60(12), 6745\u20136751 (2012).","journal-title":"Enhancing security in correlated channel with maximal ratio combining diversity.IEEE Trans. on Signal Process"},{"issue":"6","key":"560_CR31","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1109\/LSP.2014.2368695","volume":"22","author":"M Tian","year":"2015","unstructured":"M Tian, X Huang, Q Zhang, J Qin, Robust AN-aided secure transmission scheme in MISO channels with simultaneous wireless information and power transfer. IEEE Signal Process. Lett. 22(6), 723\u2013727 (2015).","journal-title":"IEEE Signal Process. Lett"},{"issue":"4","key":"560_CR32","first-page":"1140","volume":"14","author":"ZQ Luo","year":"2004","unstructured":"ZQ Luo, JF Sturm, S Zhang, Multivariate nonnegative quadratic mappings.SIAM. J. Optim. 14(4), 1140\u20131162 (2004).","journal-title":"J. Optim"},{"issue":"1","key":"560_CR33","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/TVT.2014.2322076","volume":"60","author":"R Feng","year":"2015","unstructured":"R Feng, Q Li, Q Zhang, J Qin, Robust secure transmission in MISO simultaneous wireless information and power transfer system. IEEE Trans. Veh. Technol. 60(1), 400\u2013405 (2015).","journal-title":"IEEE Trans. Veh. Technol"},{"issue":"3","key":"560_CR34","first-page":"844","volume":"17","author":"A Beck","year":"2006","unstructured":"A Beck, YC Eldar, Strong duality in nonconvex quadratic optimization with two quadratic constraints.SIAM. J. Optim. 17(3), 844\u2013860 (2006).","journal-title":"J. Optim"},{"key":"560_CR35","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S Boyd","year":"2004","unstructured":"S Boyd, L Vandenberghe, Convex Optimization (Cambridge University Press, Cambridge, 2004)."},{"key":"560_CR36","doi-asserted-by":"crossref","unstructured":"I Polik, T Terlaky, in Nonlinear Optimization, ed. by G Di Pillo, F Schoen, and 1. Interior Point Methods for Nonlinear Optimization (SpringerBerlin, 2010). ch.4.","DOI":"10.1007\/978-3-642-11339-0_4"},{"key":"560_CR37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511810817","volume-title":"Matrix Analysis","author":"RA Horn","year":"1985","unstructured":"RA Horn, CR Johnson, Matrix Analysis (Cambridge University Press, Cambridge, 1985)."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0560-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0560-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0560-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0560-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T23:56:44Z","timestamp":1567641404000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0560-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,1]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["560"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0560-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,3,1]]},"article-number":"68"}}