| [1] | Shannon C E. Communication theory of secrecy system[J]. Bell System Technical Journal, 1949, 28(4): 656-715. |
| [2] | Leung-Yan-Cheong S K and Hellman M E. The Gaussian wiretap channel[J]. IEEE Transactions on Information Theory, 1978, 24(4): 451-456. |
| [3] | Yang Ye, Li Qiang, Ma W K, et al.. Cooperative secure beamforming for AF relay networks with multiple eavesdroppers[J]. IEEE Signal Processing Letters, 2013, 20(1): 35-38. |
| [4] | Zhang Jun-wei and Gursoy M C. Collaborative relay beamforming for secrecy[C]. IEEE International Conference on Communications, Cape Town, 2010: 1-5. |
| [5] | Li Qiang and Ma W K. Spatially selective artificial-noise aided transmit optimization for MISO multi-eves secrecy rate maximization[J]. IEEE Transactions on Signal Processing, 2013, 61(10): 2704-2717. |
| [6] | Wang Hui-ming, Yin Qin-ye, and Xia Xiang-gen. Distributed beamforming for physical-layer security of two-way relay networks[J]. IEEE Transactions on Signal Processing, 2012, 60(7): 3532-3545. |
| [7] | Goel S and Negi R. Secret communication in presence of colluding eavesdroppers[C]. IEEE Military Communications Conference, Atlantic City, NJ, 2005, Vol.3: 1501-1506. |
| [8] | Pinto P C, Barros J, and Win M Z. Secure communication in stochastic wireless networkspart II: maximum rate and collusion[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 139-147. |
| [9] | Pinto P C, Barros J, and Win M Z. Wireless physical-layer security: the case of colluding eavesdroppers[C]. IEEE International Symposium on Information Theory, Seoul, 2009: 2442-2446. |
| [10] | Cai Chun-xiao, Cai Yue-ming, Yang Wei-wei, et al.. Secure connectivity using randomize-and-forward strategy in cooperative wireless networks[J]. IEEE Communications Letters, 2013, 17(7): 1340-1343. |
| [11] | Liang Ying-bin, Gerhard K, Vincent H, et al.. Compound wiretap channels[J]. EURASIP Journal on Wireless Communications and Networking, 2009, 3(1): 53-56. |
| [12] | Li Quan-zhong, Zhang Qi, and Qin Jia-yin. Robust beamforming for cognitive multi-antenna relay networks with bounded channel uncertainties[J]. IEEE Transactions on Communications, 2014, 62(2): 478-487. |
| [13] | Luo Z Q, Sturm J F, and Zhang S. Multivariate nonnegative quadratic mappings[J]. Society for Industrial and Applied Mathematics Journal on Optimization, 2004, 14(4): 1140-1162. |
| [14] | Boyd S and Vandenbeighe L. Convex Optimization[M]. UK: Cambridge University, 2004: 69-71, 168-169, 655. |
| [15] | Luo Zhi-quan, Ma W K, So A M C, et al.. Semidefinite relaxation of quadratic optimization problems[J]. IEEE Signal Processing Magazine, 2010, 27(3): 20-34. |
| [16] | Charnes A and Cooper W W. Programming with linear fractional functionals[J]. Naval Research Logistics Quarterly, 1962, 9(3): 181-186. |
| [17] | Boyd S, Ghaoui L E, Feron E, et al.. Linear Matrix Inequalities in System and Control Theory[M]. Philadelphia: Society of Industrial and Applied Mathematics, 1994: 7-9. |
| [18] | Liao Wei-cheng, Chang T H, Ma W K, et al.. QoS-based transmit beamforming in the presence of eavesdroppers an artificial-noise-aided approach[J]. IEEE Transactions on Signal Processing, 2011, 59(3): 1202-1216. |