This paper considers simultaneous wireless information and power transfer in a multiple-input single-output downlink system consisting of one multi-antenna transmitter, one single-antenna information receiver, multiple multi-antenna eavesdroppers (Eves), and multiple single-antenna energy-harvesting receivers (ERs). The main objective is to keep the probability of the legitimate user's achievable secrecy rate outage as well as the ERs' harvested energy outage caused by channel state information uncertainties below some prescribed thresholds. As is well known, the secrecy rate outage constraints present a significant analytical and computational challenge. Incorporating the energy harvesting outage constraints only intensifies that challenge...
Radio frequency (RF) energy transfer techniques have been regarded as the key enabling solutions to ...
In this paper, we propose beamforming schemes to simultaneously transmit data to multiple informatio...
In this paper, we consider the sum secrecy rate maximization problem in multiuser multiple-input sin...
This paper considers simultaneous wireless information apower transfer (SWIPT) in a multiple-input m...
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power tra...
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power tra...
In this paper, we propose beamforming schemes to simultaneously transmit data securely to multiple i...
We consider the optimization of the downlink transmission for simultaneous wireless information and ...
PhD ThesisSimultaneous wireless information and power transfer (SWIPT) is a promising technology th...
In this article, downlink secure transmission in simultaneous information and power transfer (SWIPT)...
This work investigates the secrecy performance of a simultaneous wireless information and power tran...
This paper investigates the beamforming design for secure transmission in multiple-input multiple-ou...
This paper analyzes the ergodic secrecy capacity of an energy-constrained multiple-antennas amplify...
We consider an MISO simultaneous wireless information and power transfer (SWIPT) system, where one t...
This paper considers the secrecy communication of a wirelessly powered network, where an energy cons...
Radio frequency (RF) energy transfer techniques have been regarded as the key enabling solutions to ...
In this paper, we propose beamforming schemes to simultaneously transmit data to multiple informatio...
In this paper, we consider the sum secrecy rate maximization problem in multiuser multiple-input sin...
This paper considers simultaneous wireless information apower transfer (SWIPT) in a multiple-input m...
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power tra...
In this paper, a multiple-input single-output (MISO) simultaneous wireless information and power tra...
In this paper, we propose beamforming schemes to simultaneously transmit data securely to multiple i...
We consider the optimization of the downlink transmission for simultaneous wireless information and ...
PhD ThesisSimultaneous wireless information and power transfer (SWIPT) is a promising technology th...
In this article, downlink secure transmission in simultaneous information and power transfer (SWIPT)...
This work investigates the secrecy performance of a simultaneous wireless information and power tran...
This paper investigates the beamforming design for secure transmission in multiple-input multiple-ou...
This paper analyzes the ergodic secrecy capacity of an energy-constrained multiple-antennas amplify...
We consider an MISO simultaneous wireless information and power transfer (SWIPT) system, where one t...
This paper considers the secrecy communication of a wirelessly powered network, where an energy cons...
Radio frequency (RF) energy transfer techniques have been regarded as the key enabling solutions to ...
In this paper, we propose beamforming schemes to simultaneously transmit data to multiple informatio...
In this paper, we consider the sum secrecy rate maximization problem in multiuser multiple-input sin...