{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T20:40:02Z","timestamp":1748983202320,"version":"3.41.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T00:00:00Z","timestamp":1464825600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571089"],"award-info":[{"award-number":["61571089"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"High-Tech Research and Development (863) Program of China","award":["2015AA01A707"],"award-info":[{"award-number":["2015AA01A707"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0641-1","type":"journal-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T04:10:26Z","timestamp":1464840626000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Robust transmit design for secure AF relay networks with imperfect CSI"],"prefix":"10.1186","volume":"2016","author":[{"given":"Lingxiang","family":"Li","sequence":"first","affiliation":[]},{"given":"Yu","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"issue":"8","key":"641_CR1","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"AD Wyner, The wire-tap channel. Bell Syst. Tech. J.54(8), 1355\u20131387 (1975).","journal-title":"Bell Syst. Tech. J."},{"issue":"4","key":"641_CR2","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"SK Leung-Yan-Cheong","year":"1978","unstructured":"SK Leung-Yan-Cheong, ME Hellman, The Gaussian wire-tap channel. IEEE Trans. Inf. Theory. 24(4), 451\u2013456 (1978).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"641_CR3","doi-asserted-by":"publisher","first-page":"2547","DOI":"10.1109\/TIT.2009.2018322","volume":"55","author":"T Liu","year":"2009","unstructured":"T Liu, S Shamai(Shitz), A note on the secrecy capacity of the multi-antenna wire-tap channel. IEEE Trans. Inf. Theory. 55(6), 2547\u20132553 (2009).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"641_CR4","doi-asserted-by":"publisher","first-page":"3088","DOI":"10.1109\/TIT.2010.2048445","volume":"56","author":"A Khisti","year":"2010","unstructured":"A Khisti, G Wornell, Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theory. 56(7), 3088\u20133104 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"641_CR5","doi-asserted-by":"publisher","first-page":"5515","DOI":"10.1109\/TIT.2010.2068852","volume":"56","author":"A Khisti","year":"2010","unstructured":"A Khisti, G Wornell, Secure transmission with multiple antennas II: the MIMOME wiretap channel. IEEE Trans. Inf. Theory. 56(11), 5515\u20135532 (2010).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"641_CR6","doi-asserted-by":"crossref","unstructured":"J Li, AP Petropulu, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Optimal input covariance for achieving secrecy capacity in Gaussian MIMO wiretap channels (Dallas, 2010), pp. 3362\u20133365.","DOI":"10.1109\/ICASSP.2010.5495998"},{"key":"641_CR7","doi-asserted-by":"crossref","unstructured":"J Li, AP Petropulu, in IEEE GLOBECOM 2011 Workshop on Physical-Layer Security. On beamforming solution for secrecy capacity of MIMO wiretap channels (Huston, 2011), pp. 889\u2013892.","DOI":"10.1109\/GLOCOMW.2011.6162584"},{"issue":"10","key":"641_CR8","doi-asserted-by":"publisher","first-page":"5013","DOI":"10.1109\/TSP.2011.2161298","volume":"59","author":"SAA Fakoorian","year":"2011","unstructured":"SAA Fakoorian, AL Swindlehurst, Solutions for the MIMO gaussian wiretap channel with a cooperative jammer. IEEE Trans. Signal Process.59(10), 5013\u20135022 (2011).","journal-title":"IEEE Trans. Signal Process."},{"key":"641_CR9","doi-asserted-by":"crossref","unstructured":"SAA Fakoorian, AL Swindlehurst, in 2012 IEEE International Symposium on Information Theory Proceedings (ISIT). Optimal power allocation for GSVD-based beamforming in the MIMO Gaussian wiretap channel (Cambridge, 2012), pp. 2321\u20132325.","DOI":"10.1109\/ISIT.2012.6283927"},{"key":"641_CR10","doi-asserted-by":"crossref","unstructured":"H-T Chiang, JS Lehnert, in IEEE Military Communications Conference (MILCOM). Optimal cooperative jamming for security (Baltimore, 2011), pp. 125\u2013130.","DOI":"10.1109\/MILCOM.2011.6127474"},{"issue":"10","key":"641_CR11","doi-asserted-by":"publisher","first-page":"4871","DOI":"10.1109\/TSP.2011.2161295","volume":"59","author":"J Huang","year":"2011","unstructured":"J Huang, AL Swindlehurst, Cooperative jamming for secure communications MIMO relay networks. IEEE Trans. Signal Process.59(10), 4871\u20134884 (2011).","journal-title":"IEEE Trans. Signal Process."},{"issue":"11","key":"641_CR12","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1109\/LSP.2014.2336803","volume":"21","author":"L Li","year":"2014","unstructured":"L Li, Z Chen, J Fang, On secrecy capacity of Gaussian wiretap channel aided by a cooperative jammer. IEEE Signal Process. Lett.21(11), 1356\u20131360 (2014).","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"641_CR13","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"G Zheng","year":"2011","unstructured":"G Zheng, L-C Choo, K-K Wong, Optimal cooperative jamming to enhance physical layer security using relays. IEEE Trans. Signal Process.59(3), 1317\u20131322 (2011).","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"641_CR14","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"L Dong, Z Han, AP Petropulu, HV Poor, Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process.58(3), 1875\u20131888 (2010).","journal-title":"IEEE Trans. Signal Process."},{"issue":"10","key":"641_CR15","doi-asserted-by":"publisher","first-page":"4985","DOI":"10.1109\/TSP.2011.2159598","volume":"59","author":"J Li","year":"2011","unstructured":"J Li, AP Petropulu, S Weber, On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process.59(10), 4985\u20134997 (2011).","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"641_CR16","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/LSP.2012.2227313","volume":"20","author":"Y Yang","year":"2013","unstructured":"Y Yang, Q Li, W-K Ma, Cooperative secure beamforming for AF relay networks with multiple eavesdroppers. IEEE Signal Process. Lett.20(1), 35\u201338 (2013).","journal-title":"IEEE Signal Process. Lett."},{"issue":"10","key":"641_CR17","doi-asserted-by":"publisher","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"I Krikidis, JS Thompson, S McLaughlin, Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun.8(10), 5003\u20135011 (2009).","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"641_CR18","unstructured":"S Vasudevan, S Adams, D Goeckel, Z Ding, D Towsley, KK Leung, in 2010 Annual Conference of ITA (ACITA). Secrecy in wireless relay channels through cooperative jamming (Imperial College, London, 2010)."},{"issue":"10","key":"641_CR19","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1109\/JSAC.2011.111216","volume":"29","author":"D Goeckel","year":"2011","unstructured":"D Goeckel, S Vasudevan, D Towsley, S Adams, Z Ding, K Leung, Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE J. Sel. Areas Commun.29(10), 2067\u20132076 (2011).","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"641_CR20","doi-asserted-by":"crossref","unstructured":"G Zheng, J Li, K-K Wong, AP Petropulu, B Ottersten, in 2012 1st IEEE International Conference on Communications in China (ICCC). Using simple relays to improve physical-layer security (Beijing, 2012), pp. 329\u2013333.","DOI":"10.1109\/ICCChina.2012.6356902"},{"key":"641_CR21","doi-asserted-by":"crossref","unstructured":"H-M Wang, M Luo, Q Yin, in IEEE Global Communications Conference (GLOBECOM). Hybrid cooperative relaying and jamming for secure two-way relay networks (Anaheim, 2012), pp. 4846\u20134850.","DOI":"10.1109\/GLOCOM.2012.6503886"},{"issue":"1","key":"641_CR22","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/TIFS.2011.2166386","volume":"7","author":"J Chen","year":"2012","unstructured":"J Chen, R Zhang, L Song, Z Han, B Jiao, Joint relay and jammer selection for secure two-way relay networks. IEEE Trans. Inf. Forensics Secur.7(1), 310\u2013320 (2012).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"641_CR23","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/LSP.2012.2227725","volume":"20","author":"H-M Wang","year":"2013","unstructured":"H-M Wang, M Luo, X-G Xia, Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper\u2019s CSI. IEEE Signal Process. Lett.20(1), 39\u201342 (2013).","journal-title":"IEEE Signal Process. Lett."},{"issue":"5","key":"641_CR24","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TVT.2012.2230657","volume":"62","author":"X Wang","year":"2013","unstructured":"X Wang, K Wang, X-D Zhang, Secure relay beamforming with imperfect channel side information. IEEE Trans. Veh. Technol.62(5), 2140\u20132155 (2013).","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"9","key":"641_CR25","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/JSAC.2013.130908","volume":"31","author":"K-H Park","year":"2013","unstructured":"K-H Park, T Wang, M-S Alouini, On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming. IEEE J. Sel. Areas Commun.31(9), 1741\u20131750 (2013).","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"641_CR26","doi-asserted-by":"crossref","unstructured":"S Vishwakarma, A Chockalingam, in IEEE International Conference on Communications (ICC). Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI (Budapest, 2013), pp. 1640\u20131645.","DOI":"10.1109\/ICC.2013.6655008"},{"key":"641_CR27","doi-asserted-by":"crossref","unstructured":"L Li, Z Chen, J Fang, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Robust transmit design for secure AF relay networks based on worst-case optimization (Florence, 2014), pp. 2719\u20132723.","DOI":"10.1109\/ICASSP.2014.6854094"},{"key":"641_CR28","doi-asserted-by":"crossref","unstructured":"Y Yang, Q Li, W-K Ma, J Ge, in IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC). Optimal joint cooperative beamforming and artificial noise design for Secrecy Rate Maximization in AF Relay Networks (Darmstadt, 2013), pp. 360\u2013364.","DOI":"10.1109\/SPAWC.2013.6612072"},{"key":"641_CR29","doi-asserted-by":"crossref","unstructured":"R Negi, S Goel, in IEEE 62nd Vehicular Technology Conference (VTC-2005-Fall). Secret communication using artificial noise (Texas, 2005), pp. 1906\u20131910.","DOI":"10.1109\/VETECF.2005.1558439"},{"key":"641_CR30","first-page":"3436","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","author":"Q Li","year":"2011","unstructured":"Q Li, W-K Ma, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). A robust artificial noise aided transmit design for MISO secrecy (Prague Congress CenterPrague, Czech Republic, 2011), pp. 3436\u20133439."},{"issue":"4","key":"641_CR31","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1109\/TSP.2011.2182344","volume":"60","author":"J Huang","year":"2012","unstructured":"J Huang, AL Swindlehurst, Robust secure transmission in MISO channels based on worst-case optimization. IEEE Trans. Signal Process.60(4), 1696\u20131707 (2012).","journal-title":"IEEE Trans. Signal Process."},{"issue":"7","key":"641_CR32","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TIFS.2013.2261060","volume":"8","author":"S Luo","year":"2013","unstructured":"S Luo, J Li, AP Petropulu, Uncoordinated cooperative jamming for secret communications. IEEE Trans. Inf. Forensics Secur.8(7), 1081\u20131090 (2013).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"641_CR33","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/LCOMM.2011.011811.102433","volume":"15","author":"X Zhou","year":"2011","unstructured":"X Zhou, MR McKay, B Maham, A Hjorungnes, Rethinking the secrecy outage formulation: a secure transmission design perspective. IEEE Commun. Lett.15(3), 302\u2013304 (2011).","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"641_CR34","doi-asserted-by":"publisher","first-page":"2170","DOI":"10.1109\/TVT.2013.2238687","volume":"62","author":"X Zhang","year":"2013","unstructured":"X Zhang, X Zhou, MR McKay, On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels. IEEE Trans. Veh. Technol.62(5), 2170\u20132181 (2013).","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"641_CR35","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/LSP.2013.2293884","volume":"21","author":"Q Li","year":"2014","unstructured":"Q Li, W-K Ma, AM-C So, A safe approximation approach to secrecy outage design for MIMO wiretap channels. IEEE Signal Process. Lett.21(1), 118\u2013121 (2014).","journal-title":"IEEE Signal Process. Lett."},{"key":"641_CR36","doi-asserted-by":"crossref","unstructured":"V Jungnickel, MS T Wirth, T Haustein, W Zirwas, in International Symposium on Wireless Communication Systems (ISWCS). Sychronization of cooperative base stations (Reykjavik, 2008), pp. 329\u2013334.","DOI":"10.1109\/ISWCS.2008.4726071"},{"key":"641_CR37","doi-asserted-by":"crossref","unstructured":"G Barriac, R Mudumbai, U Madhow, in 3rd International Symposium on Information Processing in Sensor Networks (IPSN). Distributed beamforming for information transfer in sensor networks (Berkeley, 2004), pp. 81\u201388.","DOI":"10.1145\/984622.984635"},{"issue":"6","key":"641_CR38","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1109\/JSAC.2008.080807","volume":"26","author":"B Zarikoff","year":"2008","unstructured":"B Zarikoff, J Cavers, Multiple frequency offset estimation for the downlink of coordinated MIMO systems. IEEE J. Sel. Areas Commun.26(6), 901\u2013912 (2008).","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"641_CR39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex optimization","author":"S Boyd","year":"2004","unstructured":"S Boyd, L Vandenberghe, Convex optimization (Cambridge University Press, Cambridge, 2004)."},{"issue":"21","key":"641_CR40","doi-asserted-by":"publisher","first-page":"5690","DOI":"10.1109\/TSP.2014.2354312","volume":"62","author":"K-Y Wang","year":"2014","unstructured":"K-Y Wang, AM-C So, T-H Chang, W-K Ma, C-Y Chi, Outage constrained robust transmit optimization for multiuser MISO downlinks: tractable approximations by conic optimization. IEEE Tran. Singal Process.62(21), 5690\u20135705 (2014).","journal-title":"IEEE Tran. Singal Process."},{"key":"641_CR41","doi-asserted-by":"publisher","unstructured":"RA Horn, CR Johnson, Matrix Analysis (Cambridge University Press, 1985).","DOI":"10.1017\/CBO9780511810817"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0641-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0641-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0641-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0641-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T20:21:50Z","timestamp":1748982110000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0641-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,2]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["641"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0641-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,6,2]]},"article-number":"142"}}