2020
DOI: 10.1049/iet-com.2020.0277
|View full text |Cite
|
Sign up to set email alerts
|

Secure beamforming method for artificial‐noise‐aided multiuser broadcast system with users of different importance under secrecy outage probability constraint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 35 publications
0
5
0
Order By: Relevance
“…Moreover, we would compare our new robust method with the BF design method which does not consider inaccurate CSI in [36]. We would also show the influence on performance by system parameters, and try to explain why these influences occur.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Moreover, we would compare our new robust method with the BF design method which does not consider inaccurate CSI in [36]. We would also show the influence on performance by system parameters, and try to explain why these influences occur.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…In the simulation procedure, we suppose a multiuser system with three users (K=3$K = 3$), and regard user‐1 as the main user, user‐2 and user‐3 as the common users. The AN generating method for algorithms in [34–36] are all classic 'null‐space' methods proposed in former articles as [7–9]. And for convenience, we set σs2=σr2=1$\sigma _s^2 = \sigma _r^2 = 1$, σe2=104$\sigma _e^2 = {10^{ - 4}}$, namely φ1=1${\varphi _1} = {\rm{}}1$, φ3=104${\varphi _3} = {10^{ - 4}}$, and Ptx=10${P_{tx}} = 10$.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
See 3 more Smart Citations