Robust AN-Aided Beamforming and Power Splitting Design for Secure MISO Cognitive Radio With SWIPT
Citations
496 citations
379 citations
Cites background or methods from "Robust AN-Aided Beamforming and Pow..."
...Mobile edge computing (MEC) and wireless power transfer (WPT) have been deemed two promising technologies to tackle the above mentioned challenges [2]–[4]....
[...]
...Compared to the conventional energy harvesting techniques, such as solar or wind charging, WPT is more attractive since it can provide a controllable and stable power supply [4]....
[...]
...In this paper, in order to shed meaningful insights into the design of a UAV-enabled wireless powered MEC system, similar to [4] and [13]–[16], the linear energy harvesting model is applied....
[...]
...P7 is convex and can be efficiently solved by using CVX [4]....
[...]
...It can be seen that P4 is convex and can be readily solved by using CVX [4]....
[...]
257 citations
Cites background from "Robust AN-Aided Beamforming and Pow..."
...Also, physical layer security has been considered in the multi-antenna scenario, and resource allocation and signal processing algorithms [6]–[8]....
[...]
236 citations
207 citations
References
[...]
33,341 citations
12,172 citations
"Robust AN-Aided Beamforming and Pow..." refers background in this paper
...Cognitive radio (CR) is a promising technique that aims to utilize spectrum efficiently and alleviate the spectrum scarcity problem [1]....
[...]
2,996 citations
"Robust AN-Aided Beamforming and Pow..." refers methods in this paper
...If the solution W is not rankone, the well-known Gaussian randomization procedure can be applied to obtain the suboptimal robust secure beamforming vector [43]....
[...]
2,651 citations
"Robust AN-Aided Beamforming and Pow..." refers background in this paper
...mitted due to space limitation. Remark 3: Since the step 6 of Algorithm 1 solves a convex optimization problem, which can be solved by using, for example, the interior-point method [39]. According to [46], the complexity of Algorithm 1 is due to three parts, namely, the uniform line search, iteration complexity and the per-iteration computation cost. Since the number of the positive semidefinite matrix...
[...]
2,352 citations
"Robust AN-Aided Beamforming and Pow..." refers methods in this paper
...This assumption has been widely used in secure CR [12], [13], [18]–[22], [44]–[46]....
[...]