Khandaker, M. R. A., & Wong, K. (2015). Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers. IEEE transactions on information forensics and security, 10(1), 40-54. https://doi.org/10.1109/TIFS.2014.2363033
Chicago Style (17th ed.) CitationKhandaker, Muhammad R. A., and Kai-Kit Wong. "Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers." IEEE Transactions on Information Forensics and Security 10, no. 1 (2015): 40-54. https://doi.org/10.1109/TIFS.2014.2363033.
MLA (9th ed.) CitationKhandaker, Muhammad R. A., and Kai-Kit Wong. "Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers." IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, 2015, pp. 40-54, https://doi.org/10.1109/TIFS.2014.2363033.
Warning: These citations may not always be 100% accurate.