Tongxing Zheng

Learn More
In this paper, we study the secure multi-antenna transmission with artificial noise (AN) under slow fading channels coexisting with randomly located eavesdroppers. We provide a comprehensive secrecy performance analysis and system design/optimization under a stochastic geometry framework. Specifically, we first evaluate the secrecy outage performance, and(More)
The heterogeneous cellular network (HCN) is a promising approach to the deployment of 5G cellular networks. This paper comprehensively studies physical layer security in a multi-tier HCN where base stations (BSs), authorized users and eavesdroppers are all randomly located. We first propose an access threshold based secrecy mobile association policy that(More)
Non-orthogonal multiple access (NOMA) is considered as a promising technology for improving the spectral efficiency (SE) in 5G. In this correspondence, we study the benefit of NOMA in enhancing energy efficiency (EE) for a multi-user downlink transmission, where the EE is defined as the ratio of the achievable sum rate of the users to the total power(More)
In this correspondence, we study the secure multiantenna transmission with artificial noise (AN) under imperfect channel state information in the presence of spatially randomly distributed eavesdroppers. We derive the optimal solutions of the power allocation between the information signal and the AN for minimizing the secrecy outage probability (SOP) under(More)
Artificial noise (AN) scheme is an efficient strategy to enhance the secrecy rate of a MISO channel in the presence of a passive eavesdropper, whose CSI is unavailable. Recently, a randomized beamforming scheme has been proposed to deteriorate the eavesdropper’s bit error rate performance via corrupting its receiving signal by a time-varying multiplicative(More)
In this paper, we provide a comprehensive study of secrecy transmission in decode-and-forward (DF) relay networks subjected to slow fading. With only channel distribution information (CDI) of the wiretap channels, we aim at maximizing secrecy throughput of the two-hop transmission under a secrecy outage constraint through optimizing transmission region,(More)