© 2017 IEEE. Some next-generation wireless networks will likely involve the energy-efficient transfer of information and energy over the same wireless channel. Moreover, densification of such networks will make the physical layer more vulnerable to cyber attacks by potential multi-antenna eavesdroppers. To address these issues, this paper considers transmit time-switching (TS) mode, in which energy and information signals are transmitted separately in time by the base station (BS). This protocol is not only easy to implement but also delivers the opportunity for multi-purpose beamforming, in which energy beamformers can be used to jam eavesdroppers during wireless power transfer. In the presence of imperfect channel estimation and multi-ant...
© 2018 Dr Amanthi ThudugalageWireless energy harvesting is one of the promising alternative methods ...
The new paradigm of wirelessly powered two-tier heterogeneous networks (HetNets) is considered in th...
In this work, we investigate a wireless powered communication network (WPCN) where multiple eavesdro...
© 2016 IEEE. Considering a multicell network for the secure wireless information and power transfer,...
© 2016 IEEE. Considering a multicell network for secure wireless information and power transfer, thi...
In this paper, we give a unified performance optimization for secrecy wireless information and power...
In this paper, we give a unified performance optimization for secrecy wireless information and power...
© 1994-2012 IEEE. Considering a multiple-user multiple-input multiple-output channel with an eavesdr...
© 1972-2012 IEEE. Information and energy can be transferred over the same radio-frequency channel. I...
In this paper, the object of study is secure transmission and green energy transfer in full-duplex (...
This paper studies interference exploitation techniques for secure beamforming design in simultaneou...
This paper studies interference exploitation techniques for secure beamforming design in simultaneou...
This paper considers the secrecy communication of a wirelessly powered network, where an energy cons...
© 2002-2012 IEEE. Considering a multi-user interference network with an eavesdropper, this paper aim...
Abstract This paper investigates the multi-cell coordinated beamforming (MCBF) design for secure sim...
© 2018 Dr Amanthi ThudugalageWireless energy harvesting is one of the promising alternative methods ...
The new paradigm of wirelessly powered two-tier heterogeneous networks (HetNets) is considered in th...
In this work, we investigate a wireless powered communication network (WPCN) where multiple eavesdro...
© 2016 IEEE. Considering a multicell network for the secure wireless information and power transfer,...
© 2016 IEEE. Considering a multicell network for secure wireless information and power transfer, thi...
In this paper, we give a unified performance optimization for secrecy wireless information and power...
In this paper, we give a unified performance optimization for secrecy wireless information and power...
© 1994-2012 IEEE. Considering a multiple-user multiple-input multiple-output channel with an eavesdr...
© 1972-2012 IEEE. Information and energy can be transferred over the same radio-frequency channel. I...
In this paper, the object of study is secure transmission and green energy transfer in full-duplex (...
This paper studies interference exploitation techniques for secure beamforming design in simultaneou...
This paper studies interference exploitation techniques for secure beamforming design in simultaneou...
This paper considers the secrecy communication of a wirelessly powered network, where an energy cons...
© 2002-2012 IEEE. Considering a multi-user interference network with an eavesdropper, this paper aim...
Abstract This paper investigates the multi-cell coordinated beamforming (MCBF) design for secure sim...
© 2018 Dr Amanthi ThudugalageWireless energy harvesting is one of the promising alternative methods ...
The new paradigm of wirelessly powered two-tier heterogeneous networks (HetNets) is considered in th...
In this work, we investigate a wireless powered communication network (WPCN) where multiple eavesdro...