参考文献/References:
[1] BLOCH M,BARROS J,RODRIGUES M R D,et al.Wireless information-theoretic security[J].IEEE Transactions on Information Forensics and Security,2008,54(6):2515-2534.DOI:10.1109/TIT.2008.921908.
[2] WYNER A D.The wire-tap channel[J].Bell System Technical Journal,1975,54(8):1355-1387.DOI:10.1002/j.1538-7305.1975.tb02040.x.
[3] ZHAO Rui,HUANG Yongming,WANG Wei,et al.Ergodic achievable secrecy rate of multiple-antenna relay systems with cooperative jamming[J].IEEE Transactions on Wireless Communications,2016,15(4):2537-2551.DOI:10.1109/TWC.2015.2504526.
[4] LI Yuanjian,ZHAO Rui,TAN Xing,et al.Secrecy performance analysis of artificial noise aided precoding in full-duplex relay systems[C]//IEEE Global Communications Conference.Singapore:IEEE Press,2017:214-218.DOI:10.1109/GLOCOM.2017.8254504.
[5] ZHAO Rui,YUAN Yi,FAN Lisheng,et al.Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagami-m fading channels[J].IEEE Transactions on Communications,2017,65(2):549-563.DOI:10.1109/TCOMM.2016.2618793.
[6] ZHAO Rui,LIN Hongxin,HE Yucheng,et al.Secrecy performance of transmit antenna selection for MIMO relay systems with outdated CSI[J].IEEE Transactions on Communications,2018,66(2):546-559.DOI:10.1109/TCO MM.2017.2747554.
[7] 沈振汉,黄华灿.B3G小区间干扰抑制技术[J].华侨大学学报(自然科学版),2011,32(2):165-168.DOI:10.11830/ISSN.1000-5013.2011.02.0165.
[8] LI Chunguo,LIU Peng,ZOU Chao,et al.Spectral-efficient cellular communications with coexistent one-and two-hop transmissions[J].IEEE Transactions on Vehicular Technology,2016,65(8):6765-6772.DOI:10.1109/TVT.2015.2472456.
[9] DONG Lun,HAN Zhu,PETROPULU A P,et al.Improving wireless physical layer security via cooperating relays[J].IEEE Transactions on Signal Processing,2010,58(3):1875-1888.DOI:10.1109/TSP.2009.2038412.
[10] CHEN Gaojie,GONG Yu,JONATHON A C.Physical layer network security in the full-duplex relay system[J].IEEE Transactions on Information Forensics and Security,2015,10(3):574-583.DOI:10.1109/TIFS.2015.2390136.
[11] SURAWEERA H A,KRIKIDIS I,ZHENG Gan,et al.Low-complexity end-to-end performance optimization in MIMO full-duplex relay systems[J].IEEE Transactions on Wireless Communications,2014,13(2):913-927.DOI:10.1109/TWC.2013.122313.130608.
[12] RIIHONEN T,WERNER S,WICHMAN R.Mitigation of loopback self-interference in full-duplex MIMO relays[J].IEEE Transaction on Signal Processing,2011,59(12):5983-5993.DOI:10.1109/TSP.2011.2164910.
[13] XU Jie,ZHANG Rui.Throughput optimal policies for energy harvesting wireless transmitters with non-ideal circuit power[J].IEEE Journal on Selected Areas in Communications,2014,32(2):322-332.DOI:10.1109/JSAC.2014.141212.
[14] LUO Shixin,ZHANG Rui,LIM T J.Optimal save-then-transmit protocol for energy harvesting wireless transmitters[J].IEEE Transactions on Wireless Communications,2013,12(3):1196-1207.DOI:10.1109/TWC.2013.0 12413.120488.
[15] ZHONG Caijun,SURAWEERA H A,ZHENG Gan,et al.Wireless information and power transfer with full duplex relaying[J].IEEE Transactions on Communications,2014,62(10):3447-3461.DOI:10.1109/TCOMM.2014.2357 423.
[16] XING Hong,LIU Liang,ZHANG Rui.Secrecy wireless information and power transfer in fading wiretap channel[J].IEEE Transactions on Vehicular Technology,2016,65(1):180-190.DOI:10.1109/TVT.2015.2395725.
[17] YING Bi,HE Chen.Accumulate and jam: Towards secure communication via a wireless-powered full-duplex jammer[J].IEEE Journal of Selected Topics in Signal Processing,2016,10(8):1538-1550.DOI:10.1109/JSTSP.2016.2600523.
[18] LIU Hongwu,KIM K J,KWAK K S,et al.Power splitting-based SWIPT with decode-and-forward full-duplex relaying[J].IEEE Transactions on Wireless Communications,2016,15(11):7561-7577.DOI:10.1109/TWC.2016.2604801.
[19] KRIKIDIS I,CHARALAMBOUS T,THOMPSON J S.Buffer-aided relay selection for cooperative diversity systems without delay constraints[J].IEEE Transactions on Wireless Communications,2012,11(5):1957-1967.DOI:10.1109/TWC.2012.032712.111970.
[20] GRADSHTEYN I S,RYZHIK I M.Table of integrals, series, and products[M].New York:Academic Press,2007.
[21] RECKTENWALD G W.Numerical methods with MATLAB: Implementation and application[M].United States:Prentice Hall,2000.
[22] LI Yuanjian,ZHAO Rui,WANG Yi,et al.Artificial noise aided precoding with imperfect CSI in full-duplex relaying secure communications[J].IEEE Access,2018,6(7):44107-44119.DOI:10.1109/ACCESS.2018.2851598.
[23] LI Yuanjian,ZHAO Rui,FAN Lisheng,et al.Antenna mode switching for full-duplex destination-based jamming secure transmission[J].IEEE Access,2018,6(1):9442-9453.DOI:10.1109/ACCESS.2018.2791638.
[24] TAN Xing,ZHAO Rui,LI Yuanjian.Large-scale antennas analysis of untrusted relay system with cooperative jamming[C]//International Conference on Network and Service Management, IEEE Computer Society.Tokyo:IEEE Press,2017:26-30.DOI:10.23919/CNSM. 2017.8256012.
[25] NIE Zhiqiao,ZHAO Rui,LI Yuanjian,et al.A full-duplex SWIPT relaying protocol based on discrete energy state[C]//IEEE 20th International Symposium on Wireless Personal Multimedia Communications.Bali:IEEE Press,2017:500-505.DOI:10.1109/ WPMC.2017.8301864.
[26] LI Chunguo,WANG Jue,ZHENG Fuchun,et al.Overhearing based cooperation for two-cell network with asymmetric uplink-downlink traffics[J].IEEE Transactions on Signal and Information Processing over Networks,2016,2(3):350-361.DOI:10.1109/TSIPN.2016.2549179.
[27] LI Chunguo,HYUN J Y,SUN Fan,et al.Multiuser overhearing for cooperative two-way multiantenna relays[J].IEEE Transactions on Vehicular Technology,2016,65(5):3796-3802.DOI:10.1109/TVT.2015.2441879.