DC programming and DCA: thirty years of developments

HA Le Thi, T Pham Dinh - Mathematical Programming, 2018 - Springer
The year 2015 marks the 30th birthday of DC (Difference of Convex functions) programming
and DCA (DC Algorithms) which constitute the backbone of nonconvex programming and …

Cooperative jamming for physical layer security enhancement in Internet of Things

L Hu, H Wen, B Wu, F Pan, RF Liao… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is becoming an emerging paradigm to achieve ubiquitous
connectivity, via massive deployment of physical objects, such as sensors, controllers, and …

Cooperative communication in physical layer security: Technologies and challenges

S Pahuja, P Jindal - Wireless Personal Communications, 2019 - Springer
Cooperative communication utilizes node cooperation for enhancing the diversity gains
during secure communication against eavesdropping and jamming which are the common …

Cooperative-jamming-aided secrecy enhancement in wireless networks with passive eavesdroppers

L Hu, H Wen, B Wu, J Tang, F Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
This paper investigates cooperative security in wireless networks, where a source (Alice)
intends to transmit a confidential message to a legitimate destination (Bob), with the help of …

Adaptive secure transmission for physical layer security in cooperative wireless networks

L Hu, H Wen, B Wu, J Tang… - IEEE Communications …, 2016 - ieeexplore.ieee.org
We investigate the physical layer security in cooperative wireless networks where a source
(Alice) transmits a confidential message to a destination (Bob) with the help of a cooperative …

Secure transmission in multiple access wiretap channel: Cooperative jamming without sharing CSI

H He, X Luo, J Weng, K Wei - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
This paper investigates the secure transmission in multiple access wiretap channels, where
multiple legitimate users transmit private information to an intended receiver in the presence …

Wireless power transfer and cooperative jamming for secrecy throughput maximization

L Tang, Q Li - IEEE Wireless Communications Letters, 2016 - ieeexplore.ieee.org
This letter studies the secure communication between a wireless powered source node and
a destination node in the presence of multiple eavesdroppers. We propose a hybrid base …

Adaptive base station cooperation for physical layer security in two-cell wireless networks

L Hu, H Wen, B Wu, J Tang, F Pan - IEEE Access, 2016 - ieeexplore.ieee.org
We study physical layer security in two-cell wireless networks in which a base station (Alice)
intends to send a confidential message to a legitimate user (Bob) with the help of a …

Optimal semiadaptive transmission with artificial-noise-aided beamforming in MISO wiretap channels

Z Li, P Mu, B Wang, X Hu - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
This paper studies the design of artificial-noise-aided (AN-aided) secure transmission in
slow-fading multiple-input–single-output (MISO) channels. We consider the scenario where …

Minimization of secrecy outage probability with artificial-noise-aided beamforming for MISO wiretap channels

D Hu, P Mu, W Zhang, W Wang - IEEE Communications Letters, 2019 - ieeexplore.ieee.org
The problem of optimal power allocation between the information-bearing signal and the
artificial noise (AN) signal is addressed in this letter to enhance the physical layer security of …