{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T21:00:55Z","timestamp":1648674055410},"reference-count":26,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2019,8,1]]},"DOI":"10.1587\/transfun.e102.a.946","type":"journal-article","created":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T22:10:47Z","timestamp":1564611047000},"page":"946-952","source":"Crossref","is-referenced-by-count":2,"title":["AN-Aided Transmission Design for Secure MIMO Cognitive Radio Network with SWIPT"],"prefix":"10.1587","volume":"E102.A","author":[{"given":"Xinyu","family":"DA","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Yango University"}]},{"given":"Lei","family":"NI","sequence":"additional","affiliation":[{"name":"Air Force Engineering University"}]},{"given":"Hehao","family":"NIU","sequence":"additional","affiliation":[{"name":"College of Electronic Engineering, National University of Defense Technology"}]},{"given":"Hang","family":"HU","sequence":"additional","affiliation":[{"name":"Air Force Engineering University"}]},{"given":"Shaohua","family":"YUE","sequence":"additional","affiliation":[{"name":"Air Force Engineering University"}]},{"given":"Miao","family":"ZHANG","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, University of York"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] A. Gupta and R.K. Jha, \u201cA survey of 5G network: Architecture and emerging technologies,\u201d IEEE Access, vol.3, pp.1206-1232, July 2015. 10.1109\/access.2015.2461602","DOI":"10.1109\/ACCESS.2015.2461602"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] K. Xiong, B. Wang, and K. Liu, \u201cRate-energy region of SWIPT for MIMO broadcasting under nonlinear energy harvesting model,\u201d IEEE Trans. Wireless Commun., vol.16, no.8, pp.5147-5161, Aug. 2017. 10.1109\/twc.2017.2706277","DOI":"10.1109\/TWC.2017.2706277"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] H. Hu, Y.-C. Liang, H. Zhang, and B.-H. Soong, \u201cCognitive radio with self-power recycling,\u201d IEEE Trans. Veh. Technol., vol.66, no.7, pp.6201-6214, July 2017. 10.1109\/tvt.2016.2635150","DOI":"10.1109\/TVT.2016.2635150"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] X. Lu, P. Wang, D. Niyato, D.I. Kim, and Z. Han, \u201cWireless networks with RF energy harvesting: A contemporary survey,\u201d IEEE Commun. Surveys Tuts., vol.17, no.2, pp.757-789, Nov. 2015. 10.1109\/comst.2014.2368999","DOI":"10.1109\/COMST.2014.2368999"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] H. Niu, B. Zhang, D. Guo, and Y. Huang, \u201cJoint robust design for secure AF relay networks with SWIPT,\u201d IEEE Access, vol.5, pp.9369-9377, June 2017. 10.1109\/access.2017.2691798","DOI":"10.1109\/ACCESS.2017.2691798"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] Z. Zhu, Z. Chu, Z. Wang, and I. Lee, \u201cOutage constrained robust beamforming for secure broadcasting systems with energy harvesting,\u201d IEEE Trans. Wireless Commun., vol.15, no.11, pp.7610-7620, Nov. 2016. 10.1109\/twc.2016.2605102","DOI":"10.1109\/TWC.2016.2605102"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] W. Mei, Z. Chen, and J. Fang, \u201cArtifcial noise aided energy effciency optimization in MIMOME system with SWIPT,\u201d IEEE Commun. Lett., vol.21, no.8, pp.1795-1798, April 2017. 10.1109\/lcomm.2017.2697951","DOI":"10.1109\/LCOMM.2017.2697951"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] F. Zhou, Z. Li, J. Cheng, Q. Li, and J. Si, \u201cRobust AN-aided beamforming and power splitting design for secure MISO cognitive radio with SWIPT,\u201d IEEE Trans. Wireless Commun., vol.16, no.4, pp.2450-2464, April 2017. 10.1109\/twc.2017.2665465","DOI":"10.1109\/TWC.2017.2665465"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] E. Boshkovska, D.W.K. Ng, N. Zlatanov, A. Koelpin, and R. Schober, \u201cRobust resource allocation for MIMO wireless powered communication networks based on a non-linear EH model,\u201d IEEE Trans. Commun., vol.65, no.6, pp.1984-1999, Feb. 2017. 10.1109\/tcomm.2017.2664860","DOI":"10.1109\/TCOMM.2017.2664860"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] L. Ni, X. Da, H. Hu, Y. Huang, R. Xu, and M. Zhang, \u201cOutage constrained robust transmit design for secure cognitive radio with practical energy harvesting,\u201d IEEE Access, vol.6, pp.71444-71454, Dec. 2018. 10.1109\/access.2018.2881477","DOI":"10.1109\/ACCESS.2018.2881477"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] Z. Sheng, H.D. Tuan, T.Q. Duong, and H.V. Poor, \u201cBeamforming optimization for physical layer security in MISO wireless networks,\u201d IEEE Trans. Signal Process., vol.66, no.14, pp.3710-3723, July 2018. 10.1109\/tsp.2018.2835406","DOI":"10.1109\/TSP.2018.2835406"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] W. Mei, Z. Chen, J. Fang, and S. Li, \u201cPhysical layer service integration in 5G: Potentials and challenges,\u201d IEEE Access, vol.6, pp.16563-16575, Feb. 2018. 10.1109\/access.2018.2805728","DOI":"10.1109\/ACCESS.2018.2805728"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] R. Xu, X. Da, H. Hu, Y. Liang, and L. Ni, \u201cPower and time slot allocation method for secured satellite transmission based on weighted fractional data carrying artificial noise,\u201d IEEE Access, vol.6, pp.65043-65054, Oct. 2018. 10.1109\/access.2018.2876878","DOI":"10.1109\/ACCESS.2018.2876878"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] L. Ni, X. Da, H. Hu, Y. Liang, and R. Xu, \u201cPHY-Aided secure communication via weighted fractional fourier transform,\u201d Wirel. Commun. Mob. Com., vol.2018, Article ID 7963451, 10 pages, 2018. [Online]. Available: https:\/\/doi.org\/10.1155\/2018\/7963451 10.1155\/2018\/7963451","DOI":"10.1155\/2018\/7963451"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] H. Xing, L. Liu, and R. Zhang, \u201cSecrecy wireless information and power transfer in fading wiretap channel,\u201d IEEE Trans. Veh. Technol., vol.65, no.1, pp.180-190, Jan. 2016. 10.1109\/tvt.2015.2395725","DOI":"10.1109\/TVT.2015.2395725"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] L. Liu, R. Zhang, and K.-C. Chua, \u201cSecrecy wireless information and power transfer with MISO beamforming,\u201d IEEE Trans. Signal Process., vol.62, no.7, pp.1850-1863, April 2014. 10.1109\/tsp.2014.2303422","DOI":"10.1109\/TSP.2014.2303422"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] Q. Shi, W. Xu, J. Wu, E. Song, and Y. Wang, \u201cSecure beamforming for MIMO broadcasting with wireless information and power transfer,\u201d IEEE Trans. Wireless Commun., vol.14, no.5, pp.2841-2853, May 2015. 10.1109\/twc.2015.2395414","DOI":"10.1109\/TWC.2015.2395414"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] H. Zhang, Y. Huang, C. Li, and L. Yang, \u201cSecure beamforming design for SWIPT in miso broadcast channel with confidential messages and external eavesdroppers,\u201d IEEE Trans. Wireless Commun., vol.15, no.11, pp.7807-7819, Nov. 2016. 10.1109\/TWC.2016.2607705","DOI":"10.1109\/TWC.2016.2607705"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] W. Wu and B. Wang, \u201cEfficient transmission solutions for MIMO wiretap channels with SWIPT,\u201d IEEE Commun. Lett., vol.19, no.9, pp.1548-1551, Sept. 2015. 10.1109\/lcomm.2015.2451179","DOI":"10.1109\/LCOMM.2015.2451179"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] E. Boshkovska, D.W.K. Ng, N. Zlatanov, and R. Schober, \u201cPractical non-linear energy harvesting model and resource allocation for SWIPT systems,\u201d IEEE Commun. Lett., vol.19, no.12, pp.2082-2085, Dec. 2015. 10.1109\/lcomm.2015.2478460","DOI":"10.1109\/LCOMM.2015.2478460"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] H. Niu, D, Guo, Y. Huang, and B. Zhang, \u201cRobust energy efficiency optimization for secure MIMO SWIPT systems with non-linear EH model,\u201d IEEE Commun. Lett., vol.21, no.12, pp.2610-2613, Sept. 2017. 10.1109\/lcomm.2017.2751603","DOI":"10.1109\/LCOMM.2017.2751603"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] R. Jiang, K. Xiong, P. Fan, Y. Zhang, and Z. Zhong, \u201cOptimal design of SWIPT systems with multiple heterogeneous users under non-linear energy harvesting model,\u201d IEEE Access, vol.5, pp.11479-11489, June 2017. 10.1109\/access.2017.2713464","DOI":"10.1109\/ACCESS.2017.2713464"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] Q. Li, M. Hong, H.-T. Wai, Y.-F. Liu, W.-K. Ma, and Z.-Q. Luo, \u201cTransmit solutions for MIMO wiretap channels using alternating optimization,\u201d IEEE J. Sel. Areas. Commun., vol.31, no.9, pp.1714-1727, Sept. 2013. 10.1109\/jsac.2013.130906","DOI":"10.1109\/JSAC.2013.130906"},{"key":"24","unstructured":"[24] M. Grant and S. Boyd, CVX: MATLAB Software for Disciplined Convex Programming. [Online]. Avaiable: http:\/\/cvxr.com\/cvx"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] H. Niu, D. Guo, Y. Huang, B. Zhang, and B. Gao, \u201cOutage constrained robust energy harvesting maximization for secure MIMO SWIPT systems,\u201d IEEE Wireless Commun. Lett., vol.6, no.5, pp.614-617, Oct. 2017. 10.1109\/lwc.2017.2722415","DOI":"10.1109\/LWC.2017.2722415"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] S. Wang and B. Wang, \u201cRobust secure transmit design in MIMO channels with simultaneous wireless information and power transfer,\u201d IEEE Signal Process. Lett., vol.22, no.11, pp.2147-2151, Nov. 2015. 10.1109\/lsp.2015.2464791","DOI":"10.1109\/LSP.2015.2464791"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E102.A\/8\/E102.A_946\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,3]],"date-time":"2019-08-03T03:33:38Z","timestamp":1564803218000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E102.A\/8\/E102.A_946\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,1]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.e102.a.946","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,1]]}}}