[1] H. Deng, H. M. Wang, W. Guo and W. Wang, “Secrecy transmission with a helper: To relay or to jam,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 293–307, Feb. 2015.
[2] R. Zhang, L. Song, Z. Han and B. Jiao, “Physical layer security for two-way untrusted relaying with friendly jammers,” IEEE Trans. Veh. Technol., vol. 61, no. 8, pp. 3693–3704, Oct. 2012.
[3] C. Jeong, I-M. Kim and D. Kim, “Joint secure beamforming design at the source and the relay for an amplify-and-forward MIMO untrusted relay system,” IEEE Trans. Signal Process., vol. 60, no. 1, pp. 310-325, Jan. 2012.
[4] J. Huang and A. L. Swindlehurst, “Cooperative jamming for secure communications in MIMO relay networks,” IEEE Trans. Signal Process., vol. 39, no. 10, pp. 4871-4884, Oct. 2011.
[5] مرضیه نظامآبادی، ابوالفضل فلاحتی، همسوسازی تداخل فرصتطلب در شبکههای رادیو شناختگر با ارسال کد فضا-زمان کاربران ثانویه، مجله مهندسی برق دانشگاه تبریز، دوره 46، شماره 2- شماره پیاپی 76، تابستان 1395، صفحه 341-333 .
[6] X. Wang, K. Wang and X. Zhang, “Secure relay beamforming with imperfect channel state information,” IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2140-2155, June 2013.
[7] H-M. Wang, M. Luo, X-G. Xia and Q. Yin, “Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper’s CSI,” IEEE Signal Proces. Lett., vol. 20, no. 1, pp. 39-42, Jan. 2013.
[8] L. Dong, Z. Han, A. P. Petropulu and H. V. Poor, “Improving wireless physical layer security via cooperating relays,” IEEE Trans. Sig. Proc., vol. 58, no. 3, pp. 1875–1888, Mar. 2010.
[9] G. Zheng, Li-Chia Choo, and K. K. Wong, “Optimal Cooperative Jamming To Enhance Physical Layer Security Using Relays,” IEEE Trans. on Sig. Proc., vol. 59, no. 3, pp. 1317 - 1322, Mar. 2011.
[10] I. Krikidis, J. S. Thompson and S. McLaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun., vol. 8, pp. 5003–5011, Oct. 2009.
[11] J. Vilela, M. Bloch, J. Barros and S. W. McLaughlin, “Wireless secrecy regions with friendly jamming,” IEEE Trans. Inf. Forens. Sec., vol. 6, pp. 256–266, June 2011.
[12] S. Gerbracht, C. Scheunert and E. A. Jorswieck, “Secrecy Outage in MISO Systems With Partial Channel Information,” IEEE Trans. Inf. Forens. Sec., vol. 7, no. 2, pp. 704-716, Apr. 2012.
[13] S. Luo, J. Li and A. Petropulu, “Outage Constrained Secrecy Rate Maximization Using Cooperative Jamming,” in Proc. 2012 IEEE Statistical Signal Processing Workshop (SSP2012), Ann Arbor, MI, Aug. 2012.
[14] Z. Ding, M. Peng and H. -H. Chen, “A general relaying transmission protocol for MIMO secrecy communications,” IEEE Trans. Commun., vol. 60, pp. 3461–3471, Nov. 2012.
[15] J. Vilela, M. Bloch, J. Barros and S. W. McLaughlin, “Wireless secrecy regions with friendly jamming,” IEEE Trans. Inf. Forens. Sec., vol. 6, pp. 256–266, June 2011.
[16] S. Gerbracht, C. Scheunert and E. A. Jorswieck, “Secrecy Outage in MISO Systems With Partial Channel Information,” IEEE Trans. Inf. Forens. Sec., vol. 7, no. 2, pp. 704-716, Apr. 2012.
[17] S. Luo, J. Li and A. Petropulu, “Outage Constrained Secrecy Rate Maximization Using Cooperative Jamming,” in Proc. 2012 IEEE Statistical Signal Processing Workshop (SSP2012), Ann Arbor, MI, Aug. 2012.
[18] Jing Huang and A. Lee Swindlehurst, “Cooperative Jamming for Secure Communications in MIMO Relay Networks,” IEEE Trans. Sig. Proc., vol. 59, no. 10, Oct. 2011.
[19] Yupeng Liu, Jiangyuan Li and A. P. Petropulu, “Destination assisted cooperative jamming for wireless physical-layer security,” IEEE Trans. Inform. Forensics Security, vol. 8, no. 4, pp. 682–694, Apr. 2013.
[20] S. Gollakota and D. Katabi, “Physical layer wireless security made fast and channel independent,” in Proc. IEEE Int. Conf. Comp. Commun., Shanghai, China, April 2011, pp. 1125–1133.
[21] T. Riihonen, S. Werner and R. Wichman, “Hybrid full-duplex/half-duplex relaying with transmit power adaptation,” IEEE Trans. Wireless Commun., vol. 10, no. 9, pp. 3074-3085, Sept. 2011.
[22] A. Mukherjee and A. L. Swindlehurst, “A full-duplex active eavesdropper in MIMO wiretap channels: Construction and countermeasures,” in Proc. Asilomar Conf. Sign. Systems Comp., Pacific Grove, CA, Nov. 2011, pp. 265-269.
[23] W. Li, M. Ghogho, B. Chen and C. Xiong, “Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis,” IEEE Commun. Lett., vol. 16, no. 10, pp. 1628-1631, Oct. 2012.
[24] محمدعلی محمدی، زهرا مبینی، نرخ قابل حصول ارسال همزمان اطلاعات و توان برای سیستم مخابرات دوطرفه مجهز به آرایه آنتن عظیم، مجله مهندسی برق دانشگاه تبریز، پذیرفته شده، 1396.
[25] M. Mohammadi, B. K. Chalise, H. A. Suraweera, C. Zhong, G. Zheng and I. Krikidis, “Throughput analysis and optimization of wireless-powered multiple antenna full-duplex relay systems,” IEEE Trans. Commun., vol. 64, no. 4, pp. 1769–1785, Apr 2016.
[26] M. Bloch, J. Barros, M. Rodrigues and S. McLaughlin, Wireless information-theoretic security, IEEE Transactions on Information Theory, 2008, 54(6): 2515–2534.
[27] I. S. Gradshteyn and I.M. Ryzhik, Table of Integrals, Series and Products, 7th ed. New York, NY, USA: Academic, 2007.