| 1 | WANG D ,  BAI B ,  ZHAO W B , et al.  A survey of optimization approaches for wireless physical layer security[J]. IEEE Communications Surveys & Tutorials, 2019, 21 (2): 1878- 1911. | 
																													
																						| 2 | VAISHNAVI K N, KHORVI S D, KISHORE R, et al. A survey on jamming techniques in physical layer security and anti-jamming strategies for 6G[C]//Proc. of the IEEE 28th International Conference on Telecommunications, 2021: 174-179. | 
																													
																						| 3 | JAMEEL F ,  WYNE S ,  KADDOUM G , et al.  A comprehensive survey on cooperative relaying and jamming strategies for physical layer security[J]. IEEE Communications Surveys & Tutorials, 2019, 21 (3): 2734- 2771. | 
																													
																						| 4 | WANG H M ,  XIA X G .  Enhancing wireless secrecy via cooperation: signal design and optimization[J]. IEEE Communications Magazine, 2015, 53 (12): 47- 53. doi: 10.1109/MCOM.2015.7355565
 | 
																													
																						| 5 | CAO Z H ,  JI X D ,  WANG J , et al.  Security-reliability trade-off analysis of AN-aided relay selection for full-duplex relay networks[J]. IEEE Trans. on Vehicular Technology, 2021, 70 (3): 2362- 2377. doi: 10.1109/TVT.2021.3057830
 | 
																													
																						| 6 | KAMBOJ A K ,  JINDAL P ,  VERMA P .  Intelligent physical layer secure relay selection for wireless cooperative networks with multiple eavesdroppers[J]. Wireless Personal Communications, 2021, 120, 2449- 2472. doi: 10.1007/s11277-021-08458-4
 | 
																													
																						| 7 | FENG Y H ,  YAN S H ,  LIU C X , et al.  Two-stage relay selection for enhancing physical layer security in non-orthogonal multiple access[J]. IEEE Trans. on Information Forensics and Security, 2019, 14 (6): 1670- 1683. doi: 10.1109/TIFS.2018.2883273
 | 
																													
																						| 8 | DATTA R ,  GURJAR D S ,  REDDY T K M , et al.  Secrecy performance of amplify-and-forward relay networks with relay selection under Nakagamim fading[J]. Wireless Personal Communications, 2020, 112 (4): 2233- 2251. doi: 10.1007/s11277-020-07147-y
 | 
																													
																						| 9 | LIU C X ,  YANG N ,  MALANEY R , et al.  Artificial-noise-aided transmission in multi-antenna relay wiretap channels with spatially random eavesdroppers[J]. IEEE Trans. on Wireless Communications, 2016, 15 (11): 7444- 7456. doi: 10.1109/TWC.2016.2602337
 | 
																													
																						| 10 | LEE K ,  BANG J ,  CHOI H H .  Secrecy outage minimization for wireless-powered relay networks with destination-assisted cooperative jamming[J]. IEEE Internet of Things Journal, 2021, 8 (3): 1467- 1476. doi: 10.1109/JIOT.2020.3013573
 | 
																													
																						| 11 | 邹羿, 黄开枝, 康小磊.  基于中继间干扰消除的轮流转发系统安全传输方案[J]. 通信学报, 2017, 38 (9): 185- 192. | 
																													
																						|  | ZOU Y ,  HUANG K Z ,  KANG X L .  Successive relaying secure transmission scheme based on inter-relay interference cancellation[J]. Journal on Communications, 2017, 38 (9): 185- 192. | 
																													
																						| 12 | CHEN X M ,  CHEN J ,  ZHANG H Z , et al.  On secrecy performance of multiantenna-jammer-aided secure communications with imperfect CSI[J]. IEEE Trans. on Vehicular Technology, 2016, 65 (10): 8014- 8024. doi: 10.1109/TVT.2015.2510502
 | 
																													
																						| 13 | CAO K R ,  WANG B H ,  DING H Y , et al.  On the security enhancement of uplink NOMA systems with jammer selection[J]. IEEE Trans. on Communications, 2020, 68 (9): 5747- 5763. doi: 10.1109/TCOMM.2020.3003665
 | 
																													
																						| 14 | SI J B ,  CHENG Z H ,  LI Z , et al.  Cooperative jamming for secure transmission with both active and passive eavesdroppers[J]. IEEE Trans. on Communications, 2020, 68 (9): 5764- 5777. doi: 10.1109/TCOMM.2020.3003946
 | 
																													
																						| 15 | 李敏, 林敏.  同信道干扰条件下的多天线放大转发中继中断概率分析[J]. 电子与信息学报, 2015, 37 (1): 163- 168. | 
																													
																						|  | LI M ,  LIN M .  Outage probability analysis of dual-hop MIMO amplify-and-forward relaying with multiple co-channel interferences[J]. Journal of Electronics & Information Technology, 2015, 37 (1): 163- 168. | 
																													
																						| 16 | XIANG Z W ,  YANG W W ,  CAI Y M , et al.  NOMA-assisted secure short-packet communications in IoT[J]. IEEE Wireless Communications, 2020, 27 (4): 8- 15. doi: 10.1109/MWC.01.1900529
 | 
																													
																						| 17 | SSETTUMBA T ,  ABD EL-MALEK A H ,  ELSABROUTY M , et al.  Physical layer security enhancement for internet of things in the presence of co-channel interference and multiple eavesdroppers[J]. IEEE Internet of Things Journal, 2019, 6 (4): 6441- 6452. doi: 10.1109/JIOT.2019.2907574
 | 
																													
																						| 18 | LI B ,  ZHOU J J ,  ZOU Y L , et al.  Security and reliability trade-off analysis of joint user and jammer selection in the face of co-channel interference[J]. IET Communications, 2019, 13 (16): 2601- 2608. doi: 10.1049/iet-com.2019.0438
 | 
																													
																						| 19 | LI B ,  ZHOU J J ,  ZOU Y L , et al.  Closed-form secrecy outage analysis of cellular downlink systems in the presence of co-channel interference[J]. IEEE Trans. on Wireless Communications, 2018, 17 (7): 4721- 4734. doi: 10.1109/TWC.2018.2830383
 | 
																													
																						| 20 | MOUALEU J M ,  HAMOUDA W ,  TAKAWIRA F .  Intercept probability analysis of wireless networks in the presence of eavesdropping attack with co-channel interference[J]. IEEE Access, 2018, 6, 41490- 41503. doi: 10.1109/ACCESS.2018.2854222
 | 
																													
																						| 21 | FAN L S ,  LEI X F ,  YANG N , et al.  Secure multiple amplify-and-forward relaying with cochannel interference[J]. IEEE Journal of Selected Topics in Signal Processing, 2016, 10 (8): 1494- 1505. doi: 10.1109/JSTSP.2016.2607692
 | 
																													
																						| 22 | TUAN V P ,  KONG H Y .  Exploiting cooperative relays to enhance the performance of energy-harvesting systems over Nakagamim fading channels[J]. Telecommunication Systems, 2018, 69 (4): 477- 487. doi: 10.1007/s11235-018-0448-y
 | 
																													
																						| 23 | 裴二荣, 易鑫, 邓炳光, 等.  D2D辅助的窄带物联网中能耗和传输成功率的最优折中[J]. 电子与信息学报, 2020, 42 (12): 2915- 2922. | 
																													
																						|  | PEI E R ,  YI X ,  DENG B G , et al.  The optimal tradeoff between energy consumption and transmission success probability in D2D assisted narrow band-internet of things[J]. Journal of Electronics & Information Technology, 2020, 42 (12): 2915- 2922. | 
																													
																						| 24 | CAO K R ,  WANG B H ,  DING H Y , et al.  Adaptive cooperative jamming for secure communication in energy harvesting relay networks[J]. IEEE Wireless Communications Letters, 2019, 8 (5): 1316- 1319. doi: 10.1109/LWC.2019.2914108
 | 
																													
																						| 25 | 孔槐聪, 林敏, 刘笑宇, 等.  基于中继选择的星地协作传输系统性能分析[J]. 系统工程与电子技术, 2020, 42 (1): 198- 205. | 
																													
																						|  | KONG H C ,  LIN M ,  LIU X Y , et al.  Performance analysis of hybrid satellite-terrestrial cooperative transmission system based on relay selection[J]. Systems Engineering and Electronics, 2020, 42 (1): 198- 205. | 
																													
																						| 26 | GRADSHTEǏN I S ,  ZWILLINGER D .  Table of integrals, series, and products[M]. 8th ed New York: Academic Press, 2014. | 
																													
																						| 27 | SONG K ,  NIE M Y ,  JIANG J , et al.  On the secrecy for relay-aided SWIPT internet of things system with cooperative eavesdroppers[J]. IEEE Access, 2021, 9, 28204- 28212. doi: 10.1109/ACCESS.2021.3058504
 | 
																													
																						| 28 | GUO H Y ,  YANG Z ,  ZHANG L H , et al.  Power-constrained secrecy rate maximization for joint relay and jammer selection assisted wireless networks[J]. IEEE Trans. on Communications, 2017, 65 (5): 2180- 2193. doi: 10.1109/TCOMM.2017.2651066
 |