References
[1] Shannon, C. E. (1949). Communication theory of secrecy systems [J]. Bell System Technical Journal, 1949, 28(4): 656-715.
[2] Lam, A. W., Sarwate, D. V. (1990). Time-hopping and frequency-hopping multiple-access packet communications [J]. IEEE Transactions on Communications, 1990, 38(6): 875-888.
[3] Win, M. Z., Scholtz, R. A. (2000). Ultra-wide bandwidth time-hopping spread-spectrum impulse radio for wireless multiple-access communications [J]. IEEE Transactions on Communications, 2000, 48(4): 679-689.
[4] Simon, M. K., Omura, J. K., Scholtz, R. A., et al. (1994). Spread spectrum communications handbook [M]. New York: McGraw-Hill, 1994.
[5] Peterson, R. L., Ziemer, R. E., Borth, D. E. (1995). Introduction to spread-spectrum communications [M]. New Jersey: Prentice hall, 1995.
[6] Win, M. Z., Scholtz, R. A. (1998). Impulse radio: How it works [J]. IEEE Communications letters, 1998, 2(2): 36-38.
[7] Win, M. Z., Scholtz, R. A. (2000). Ultra-wide bandwidth time-hopping spread-spectrum impulse radio for wireless multiple-access communications [J]. IEEE Transactions on Communications, 2000, 48(4): 679-689.
[8] Renna, F., Bloch, M. R., Laurenti, N. (2012). Semi-blind key-agreement over MIMO fading channels [J]. IEEE Transactions on Communications, 2012, 61(2): 620-627.
[9] Appendix: Yang, N., Elkashlan, M., Duong, T. Q., et al. (2015). Optimal transmission with artificial noise in MISOME wiretap channels [J]. IEEE Transactions on Vehicular Technology, 2015, 65(4): 2170-2181.
[10] Yang, N., Yan, S., Yuan, J., et al. (2015). Artificial noise: Transmission optimization in multi-input single-output wiretap channels [J]. IEEE Transactions on Communications, 2015, 63(5): 1771-1783.
[11] Zhang, X., Zhou, X., McKay, M. R. (2013). On the design of artificial-noise-aided secure multi-antenna transmission in slow fading channels [J]. IEEE Transactions on Vehicular Technology, 2013, 62(5): 2170-2181.
[12] Huang, J., Swindlehurst, A. L. (2011). Cooperative jamming for secure communications in MIMO relay networks [J]. IEEE Transactions on Signal Processing, 2011, 59(10): 4871-4884.
[13] Deng, H., Wang, H. M., Guo, W., et al. (2014). Secrecy transmission with a helper: To relay or to jam [J]. IEEE Transactions on Information Forensics and Security, 2014, 10(2): 293-307.
[14] Wang, X., Zhang, Z., Long, K. (2015). Secure beamforming for multiple-antenna amplify-and-forward relay networks [J]. IEEE Transactions on Signal Processing, 2015, 64(6): 1477-1492.
[15] Gong, X., Yin, H., Dong, F., et al. (2016). Robust beamforming design for secrecy in multiuser peer-to-peer wireless relay networks [J]. IEEE Systems Journal, 2016, 12(1): 682-690.
[16] Wang, C., Wang, H. M., Ng, D. W. K., et al. (2015). Joint beamforming and power allocation for secrecy in peer-to-peer relay networks [J]. IEEE Transactions on Wireless Communications, 2015, 14(6): 3280-3293.
[17] Wang, W., The, K. C., Li, K. H. (2015). Generalized relay selection for improved security in cooperative DF relay networks [J]. IEEE Wireless Communications Letters, 2015, 5(1): 28-31.
[18] Chang, C., Huan, H., Xu, J., et al. (2017). Multidimensional parallel combinatory transform domain communication system [J]. International Journal of Communication Systems, 2017, 30(11): e3249.
[19] Chakravarthy, V., Nunez, A. S., Stephens, J. P., et al. (2005). TDCS, OFDM, and MC-CDMA: a brief tutorial [J]. IEEE Communications Magazine, 2005, 43(9): S11-S16.
[20] Chakravarthy, V., Li, X., Wu, Z., et al. (2009). Novel overlay/underlay cognitive radio waveforms using SD-SMSE framework to enhance spectrum efficiency-part I: theoretical framework and analysis in AWGN channel [J]. IEEE Transactions on Communications, 2009, 57(12): 3794-3804.
[21] Koeppl, H. (2009). A Local Nonlinear Model for the Approximation and Identification of a Class of Systems [J]. IEEE Transactions on Circuits & Systems II Express Briefs, 2009, 56(4): 315-319.
[22] Matsui, M. (1994). Linear cryptanalysis method for DES cipher (III) [C]//Proceedings of the 1994 Symposium on Cryptography and Information Security (SCIS 94), Lake Biwa, Japan. 1994, 27-29.
[23] Tsimbinos, J. (1995). Identification and compensation of nonlinear distortion [D]. University of South Australia, 1995.
[24] Zhu, Z., Leung, H., Huang, X. (2013). Challenges in reconfigurable radio transceivers and application of nonlinear signal processing for RF impairment mitigation [J]. IEEE Circuits and Systems Magazine, 2013, 13(1): 44-65.