Wang, D., et al. (2018). From IoT to 5G I-IoT: The next generation IoT-based intelligent algorithms and 5G technologies. IEEE Communications Magazine, 56(10), 114–120.
Lu, X., et al. (2021). Secure wirelessly powered networks at the physical layer: Challenges, countermeasures, and road ahead. Proceedings of the IEEE, 110(1), 193–209.
Zhang, Y., et al. (2017). Security optimization of exposure region-based beamforming with a uniform circular array. IEEE Transactions on Communications, 66(6), 2630–2641.
Cao, Y., et al. (2019). Secure transmission via beamforming optimization for NOMA networks. IEEE Wireless Communications, 27(1), 193–199.
Yu, X., et al. (2020). Robust and secure wireless communications via intelligent reflecting surfaces. IEEE Journal on Selected Areas in Communications, 38(11), 2637–2652.
Chen, X., et al. (2020). Securing aerial-ground transmission for NOMA-UAV networks. IEEE Network, 34(6), 171–177.
Zheng, T.-X., et al. (2021). Wireless covert communications aided by distributed cooperative jamming over slow fading channels. IEEE Transactions on Wireless Communications, 20(11), 7026–7039.
Bendary, A., Abdelaziz, A., & Koksal, C. E. (2021). Achieving positive covert capacity over MIMO AWGN channels. IEEE Journal on Selected Areas in Information Theory, 2(1), 149–162.
Forouzesh, M., et al. (2020). Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens. IEEE Transactions on Communications, 68(6), 3737–3749.
Chen, X., et al. (2021). Multi-antenna covert communication via full-duplex jamming against a warden with uncertain locations. IEEE Transactions on Wireless Communications, 20(8), 5467–5480.
Lv, L., et al. (2022). Achieving covert wireless communication with a multi-antenna relay. IEEE Transactions on Information Forensics and Security, 17, 760–773.
Hu, J., et al. (2018). Covert communication achieved by a greedy relay in wireless networks. IEEE Transactions on Wireless Communications, 17(7), 4766–4779.
Ren, Q., & Yao, G. (2021). Enhancing harvested energy utilization for energy harvesting wireless sensor networks by an improved uneven clustering protocol. IEEE Access, 9, 119279–119288.
Vignesh, S., et al. (2021). Analysis on energy harvesting techniques for underwater wireless sensor networks. In: 2021 Third international conference on intelligent communication technologies and virtual mobile networks (ICICV). IEEE.
Sharma, P., & Singh, A. K. (2021). Compact ambient RF energy harvesting CPW Fed Antenna for WLAN. In: 2021 5th international conference on trends in electronics and informatics (ICOEI). IEEE.
Zhao, B., & Zhao, X. (2021). Deep reinforcement learning resource allocation in wireless sensor networks with energy harvesting and relay. IEEE Internet of Things Journal, 9(3), 2330–2345.
Mortazavi, S. M., Ashtiani, F., & Mirmohseni, M. (2020). Optimal energy sharing for cooperative relaying in a random access network with energy harvesting nodes. IEEE Transactions on Green Communications and Networking, 5(1), 231–242.
Xu, S., & Song, X. (2022). Secure energy efficiency maximization for untrusted wireless-powered full-duplex relay networks under nonlinear energy harvesting. IEEE Systems Journal.
Gouissem, A., et al. (2022). A secure energy efficient scheme for cooperative IoT networks. IEEE Transactions on Communications.
Hu, J., et al. (2019). Covert transmission with a self-sustained relay. IEEE Transactions on Wireless Communications, 18(8), 4089–4102.
Yoon, I., & Noh, D. K. (2022). Adaptive data collection using UAV with wireless power transfer for wireless rechargeable sensor networks. IEEE Access, 10, 9729–9743.
Ruan, T., Chew, Z. J., & Zhu, M. (2017). Energy-aware approaches for energy harvesting powered wireless sensor nodes. IEEE Sensors Journal, 17(7), 2165–2173.
Chew, Z. J., Ruan, T., & Zhu, M. (2020). Energy savvy network joining strategies for energy harvesting powered TSCH nodes. IEEE Transactions on Industrial Informatics, 17(2), 1505–1514.
Shiu, Y.-S., et al. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2), 66–74.
Goel, S., & Negi, R. (2008). Guaranteeing secrecy using artificial noise. IEEE Transactions on Wireless Communications, 7(6), 2180–2189.
Tao, L., et al. (2021). Achieving covert communication in uplink NOMA systems via energy harvesting jammer. IEEE Communications Letters, 25(12), 3785–3789.
Sobers, T. V., Bash, B. A., Guha, S., Towsley, D., & Goeckel, D. (2017). Covert communication in the presence of an uninformed jammer. IEEE Transactions on Wireless Communications, 16(9), 6193–6206.
Wang, H.-M., Yin, Q., Wang, W., & Xia, X.-G. (2013). Joint null-space beamforming and jamming to secure AF relay systems with individual power constraint. In: 2013 IEEE international conference on acoustics, speech and signal processing (pp. 2911−2914). IEEE.
Grant, M., & Boyd, S. (2014). “CVX: Matlab software for disciplined convex programming, version 2.1,” ed.
Luo, Z.-Q., Ma, W.-K., So, A.M.-C., Ye, Y., & Zhang, S. (2010). emidefinite relaxation of quadratic optimization problems. IEEE Signal Processing Magazine, 27(3), 20–34.