[1]WYNER A D.The wiretap channel[J].Bell System Technical Journal,1975,54(8):1355-1387.br/
[2]SAAD W,HAN Zhu,BASAR T,et al.Physical layer security:coalitional games for distributed coopera-tion[C]//Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile,Ad Hoc,and Wireless Networks.Washington
D.C.,USA:IEEE Press,2009:1-8.br/
[3]付晓梅,姚晓明,宗群.合作联盟中的节点选择及功率优化方法[J].系统工程与电子技术,2016,38(5):1176-1181.br/
[4]MUKHERJEE A,SWINDLEHURST A L.Jamming games in the MIMO wiretap channel with an active eavesdropper[J].IEEE Transactions on Signal Processing,2013,61(1):82-91.br/
[5]ARA M,REBOREDO H,GHANEM S A M.A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer[C]//Proceedings of IEEE International Conference on Communication Systems.Washington D.C.,USA:IEEE
Press,2012:60-64.br/
[6]方禾,许力,苏彬庭,等.多信道无线网络中窃听与干扰攻击的对抗策略[J].四川大学学报(工程科学版),2016,48(1):119-125.br/
[7]CHEN Xiaoming,LEI Lei.Energy-efficient optimization for physical layer security in multi-antenna downlink networks with QoS guarantee[J].IEEE Communications Letters,2013,17(4):637-640.br/
[8]CHEN Xiaoming,YIN Rui.Performance analysis for physical layer security in multi-antenna downlink networks with limited CSI feedback[J].IEEE Wireless Communications Letters,2013,2(5):503-506.br/
[9]CHEN Xiaoming,ZHANG Yu.Mode selection in MU-MIMO downlink networks:a physical-layer security perspective[J].IEEE Systems Journal,2017,11(2):1128-1136.br/
[10]SCHUBERT M,BOCHE H.Solution of the multiuser downlink beamforming problem with individual SINR constraints[J].IEEE Transactions on Vehicular Technology,2004,53(1):18-28.br/
[11]BOCHE H,SCHUBERT M.A general duality theory for uplink and downlink beamforming[C]//Proceedings of the 56th IEEE Vehicular Technology Conference.Washington D.C.,USA:IEEE Press,2002:87-91.br/
[12]PESAVENTO M,CIOCHINA D,GERSHMAN A B.Iterative dual downlink beamforming for cognitive radio networks[C]//Proceedings of the 5th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.Washington
D.C.,USA:IEEE Press,2010:1-5.br/
[13]林胜斌,黄开枝,王文,等.存在恶意干扰者时一种基于连续零和博弈的物理层安全传输方法[J].信号处理,2015(6):720-726.br/
[14]刘宗谦,于加尚,李江峰.连续博弈中的混合策略性质及其均衡[J].首都师范大学学报,2007,2(2):13-18.br/
[15]BOYD S,VANDENBERGHE L.Convex optimiza-tion[M].Cambridge,UK:Cambridge University Press,2013.br/ |