Personal Information
-
Date of Birth:
1993-06-01 -
Date of Employment:
2022-07-12 -
School/Department:
计算机学院 -
Gender:
Female -
Status:
On-the-job -
Teacher College:
School of Computer Science
Other Contact Information:
-
Telephone:
34687a723eac0ff313e12e1c64d548b24049657e0822725911fd49c4d7e0e045de94f690f8c37dd615b2a231b0f4847ecf20bb716285bf38df482aa5aad5ef328382ebb5f545a96834645e2bef6d4615375af90c3672a5cbe989e4ea08ca6fa10b52c9e99cd7662d76d9ca28403b70616f778f610c6355fb53f5f18d0ff33949 -
Email:
7c15073ef83d586dff621380cf9eacbec4b3b23278f2bfd50ced17d3db6f84c91f3d93520204c62d47e6c6d0c0dba138c17dd050e755a10854f78da7035deaeaa558e1bb20387c9f8ae13fb5ab6cfd953aade14f6fb956e05fe35fffece1468e934c71093d919d2da740badbc12e00b398185bd189b79c881b804e8c6804f5d1
Paper Publications
Current position: Home > Scientific Research > Paper Publications
Robust Secure Beamforming in MIMO Wiretap Channels With Deterministically Bounded Channel Errors
- Release time:2022-09-02
- Hits:
Impact Factor:
6.239DOI number:
10.1109/TVT.2018.2864542Journal:
IEEE Transactions on Vehicular TechnologyAbstract:
In this paper, a multiple-input multiple-output wiretap channel model is studied, where the information packet sent from the transmitter to the desired receiver is wiretapped by a potential eavesdropper. When ideal channel state information (CSI) is available, we design the secure beamforming using a proposed iterative closed-form updating scheme based on majorization-minimization approach. Numerical results demonstrate that the proposed scheme acquires the same secrecy rate as the existing algorithms whereas it has much lower complexity. When ideal CSI is not available and channel errors are modeled by deterministically bounded model, we investigate robust secure beamforming (RSB) optimization problem whose goal is worst-case secrecy rate maximization. In the formulated optimization problem, the objective function includes the expression of a logarithm of a determinant (log det) minus log det. Instead of approximating the log det expression as a trace, we propose to linearize two log det terms. After linearization, epigraph reformulation is used to deal with deterministically bounded channel errors and semi-infinite constraints are recast as linear matrix inequalities. Finally, an alternating optimization algorithm is utilized to find the RSB design. After obtaining the RSB design, we derive the worst-case secrecy rate. Numerical results illustrate that the proposed RSB design is superior to the nonrobust one.Co-author:
Li Yiqing,李全忠,秦家银First Author:
jmiaoIndexed by:
Journal paperCorrespondence Author:
张旗Discipline:
EngineeringFirst-Level Discipline:
Information and Communication EngineeringDocument Type:
JVolume:
67Issue:
10Page Number:
9775–9784ISSN No.:
1939-9359Translation or Not:
noDate of Publication:
2018-10-01Included Journals:
SCILinks to published journals:
https://ieeexplore.ieee.org/document/8430548