On the secrecy throughput maximization for MISO cognitive radio network in slow fading channels

C Wang, HM Wang - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
… its target throughput can be satisfied. Our goal is to maximize the secrecy throughput of the
… ST, subjected to the secrecy outage constraint at the PU and the throughput constraint at the …

Minimum secrecy throughput maximization in wireless powered secure communications

C Guo, B Liao, D Feng, C He… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
secrecy throughput balancing across different legitimate users, we aim to maximize the
minimum secrecy throughput … the problem of minimum throughput maximization which is convex …

Throughput maximization in multi-hop wireless networks under a secrecy constraint

PHJ Nardelli, H Alves, CHM De Lima, M Latva-Aho - Computer Networks, 2016 - Elsevier
… high or low spectral efficiency) so that the secrecy constraint is satisfied. Using a stochastic-…
throughput subject to the secrecy constraint achieves the unconstrained optimal performance

Secrecy throughput maximization for full-duplex wireless powered IoT networks under fairness constraints

R Rezaei, S Sun, X Kang, YL Guan… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
… , referred to as sum secrecy throughput maximization (SSTM). In … We then consider secrecy
throughput fairness among the … algorithm maximizes the minimum secrecy throughput of the …

Secrecy energy efficiency maximization in cognitive radio networks

J Ouyang, M Lin, Y Zou, WP Zhu, D Massicotte - IEEE Access, 2017 - ieeexplore.ieee.org
secrecy rate (SR) and energy efficiency (EE) in an underlay cognitive radio network (CRN)
that consists of a cognitive base station (… By using a so-called secrecy energy efficiency (SEE), …

Secrecy throughput maximization for MISO multi-eavesdropper wiretap channels

W Wang, KC Teh, KH Li - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
… 2) We adopt a different performance metric, ie, the effective secrecy throughput, which … 3)
We mathematically proved the quasi-concavity of the effective secrecy throughput wrt the power …

Secrecy throughput maximization for IRS-aided MIMO wireless powered communication networks

W Shi, Q Wu, F Xiao, F Shu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… Moreover, to realize a desirable tradeoff between SE and EE, a multi-objective
optimization framework was formulated in a DL MISO cognitive radio network with non-orthogonal …

Outage constrained secrecy throughput maximization for DF relay networks

TX Zheng, HM Wang, F Liu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
… of the primary user in a MISO cognitive radio network st a secrecy outage constraint at …
secrecy throughput maximization problem for both schemes. By comparing the secrecy throughput

Secure communications over wireless broadcast networks: Stability and utility maximization

Y Liang, HV Poor, L Ying - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
secrecy capacity region for the noncollaborative eavesdropping model. We have also obtained
a secrecy throughput … policies for maximum throughput in multihop radio networks,” IEEE …

Wireless power transfer and cooperative jamming for secrecy throughput maximization

L Tang, Q Li - IEEE Wireless Communications Letters, 2016 - ieeexplore.ieee.org
… We aim to maximize the secrecy throughput by jointly optimizing the time allocation, … secrecy
constraint and transmit power constraint. We transform the secrecy throughput maximization