| 1 | SHANNON C E .  Communication theory of secrecy systems[J]. Bell Labs Technical Journal, 1949, 28 (4): 656- 715. doi: 10.1002/j.1538-7305.1949.tb00928.x
 | 
																													
																							| 2 | WYNER A D .  The wire-tap channel[J]. Bell Labs Technical Journal, 1975, 54 (8): 1355- 1387. doi: 10.1002/j.1538-7305.1975.tb02040.x
 | 
																													
																							| 3 | CSISZAR I ,  KORNER J .  Broadcast channels with confidential messages[J]. IEEE Trans.on Information Theory, 1978, 24 (3): 339- 348. doi: 10.1109/TIT.1978.1055892
 | 
																													
																							| 4 | JOÃO B, RODRIGUES M R D. Secrecy capacity of wireless channels[C]//Proc.of the IEEE International Symposium on Information Theory, 2006: 356-360. | 
																													
																							| 5 | OOHAMA Y. Capacity theorems for relay channels with confidential messages[C]// Proc.of the IEEE International Symposium on Information Theory, 2007: 926-930. | 
																													
																							| 6 | GGIER F ,  HASSIBI B .  A perspective on the MIMO wiretap channel[J]. Proceedings of the IEEE, 2015, 103 (10): 1874- 1882. doi: 10.1109/JPROC.2015.2468077
 | 
																													
																							| 7 | HONG Y W P ,  LAN P-C ,  KUO C C J .  Enhancing physical-layer secrecy in multi-antenna wireless systems: an overview of signal processing approaches[J]. IEEE Signal Processing Magazine, 2013, 30 (5): 29- 40. doi: 10.1109/MSP.2013.2256953
 | 
																													
																							| 8 | UKHERJEE A ,  FAKOORIAN S A A ,  HUANG J , et al.  Principles of physical layer security in multiuser wireless networks: a survey[J]. IEEE Communications Surveys and Tutorials, 2014, 16 (3): 1550- 1573. doi: 10.1109/SURV.2014.012314.00178
 | 
																													
																							| 9 | WANG H M ,  XIA X G .  Enhancing wireless secrecy via cooperation signal design and optimization[J]. IEEE Communications Magazine, 2015, 53 (12): 47- 53. doi: 10.1109/MCOM.2015.7355565
 | 
																													
																							| 10 | CHEN X ,  NG D W K ,  GERSTACKER W H , et al.  A survey on multiple-antenna techniques for physical layer security[J]. IEEE Communications Surveys and Tutorials, 2017, 19 (2): 1027- 1053. doi: 10.1109/COMST.2016.2633387
 | 
																													
																							| 11 | HUO Y ,  TIAN Y ,  MA L , et al.  Jamming strategies for physical layer security[J]. IEEE Wireless Communications, 2018, 25 (1): 148- 153. doi: 10.1109/MWC.2017.1700015
 | 
																													
																							| 12 | HAN S ,  KIM H J ,  LEE J , et al.  Secure capacity analysis for magnetic inductive coupling-based SWIPT system[J]. IEEE Access, 2018, 6, 49182- 49191. doi: 10.1109/ACCESS.2018.2868225
 | 
																													
																							| 13 | HARRISON W K ,  ALMEIDA J ,  BLOCH M R , et al.  Coding for secrecy: an overview of error-control coding techniques for physical-layer security[J]. IEEE Signal Processing Magazine, 2013. | 
																													
																							| 14 | BLOCH M ,  HAYASHI M ,  THANGARAJ A .  Error-control coding for physical-layer secrecy[J]. Proceedings of the IEEE, 2015, 103 (10): 1725- 1746. doi: 10.1109/JPROC.2015.2463678
 | 
																													
																							| 15 | OGGIER F ,  SOLE P ,  BELFIORE J C .  Lattice codes for the wiretap Gaussian channel: construction and analysis[J]. IEEE Trans.on Information Theory, 2016, 62 (10): 5690- 5708. doi: 10.1109/TIT.2015.2494594
 | 
																													
																							| 16 | CHOU R A ,  BLOCH M R .  Polar coding for the broadcast channel with confidential messages: a random binning analogy[J]. IEEE Trans.on Information Theory, 2016, 62 (5): 2410- 2429. doi: 10.1109/TIT.2016.2539145
 | 
																													
																							| 17 | CHOU RA ,  VELLAMBI B N ,  BLOCH M R , et al.  Coding schemes for achieving strong secrecy at negligible cost[J]. IEEE Trans.on Information Theory, 2017, 63 (3): 1858- 1873. doi: 10.1109/TIT.2016.2645225
 | 
																													
																							| 18 | SAYED M A M ,  LIU R ,  ZHANG C .  A novel scrambler design for enhancing secrecy transmission based on polar code[J]. IEEE Communications Letters, 2017, 21 (8): 1679- 1682. doi: 10.1109/LCOMM.2017.2697427
 | 
																													
																							| 19 | KIM I ,  KIM B ,  AHN J K .  Secure polar coding with REP and XOR coding[J]. IEEE Communications Letters, 2017, 21 (10): 2126- 2129. doi: 10.1109/LCOMM.2017.2726523
 | 
																													
																							| 20 | HAO W ,  YIN L ,  HUANG Q .  Secrecy transmission scheme based on 2-D polar coding over block fading wiretap channels[J]. IEEE Communications Letters, 2018, 22 (5): 882- 885. doi: 10.1109/LCOMM.2018.2810888
 | 
																													
																							| 21 | 白慧卿, 金梁, 肖帅芳, 等.  多天线系统中面向物理层安全的极化编码方法[J]. 电子与信息学报, 2017, 39 (11): 2587- 2593. | 
																													
																							|  | BAI H Q ,  JIN L ,  XIAO S F , et al.  Polar code for physical layer security in multi-antenna systems[J]. Journal of Electronics and Information Technology, 2017, 39 (11): 2587- 2593. | 
																													
																							| 22 | 易鸣, 季新生, 黄开枝, 等.  一种具有最佳错误扩散的无线物理层安全编码[J]. 信息工程大学学报, 2014, 15 (4): 417- 424. doi: 10.3969/j.issn.1671-0673.2014.04.006
 | 
																													
																							|  | YI M ,  JI X S ,  HUANG K Z , et al.  Wireless physical layer security coding with optimized error propagation[J]. Journal of Information Engineering University, 2014, 15 (4): 417- 424. doi: 10.3969/j.issn.1671-0673.2014.04.006
 | 
																													
																							| 23 | KLINC D ,  MCLAUGHLIN S W ,  BARROS J .  LDPC codes for the Gaussian wiretap channel[J]. IEEE Trans.on Information Forensics and Security, 2011, 6 (3): 532- 540. doi: 10.1109/TIFS.2011.2134093
 | 
																													
																							| 24 | BALDI M ,  BIANCHI M ,  CHIARALUCE F .  Coding with scrambling, concatenation, and HARQ for the AWGN wire-tap channel: a security gap analysis[J]. IEEE Trans.on Information Forensics and Security, 2012, 7 (3): 883- 894. doi: 10.1109/TIFS.2012.2187515
 | 
																													
																							| 25 | ZHANG Y ,  LIU A ,  GONG C , et al.  Polar-LDPC concatenated coding for the AWGN wiretap channel[J]. IEEE Communications Letters, 2014, 18 (10): 1683- 1686. doi: 10.1109/LCOMM.2014.2353811
 | 
																													
																							| 26 | NOORAIEPOUR A ,  DUMAN T M .  Randomized convolutional codes for the wiretap channel[J]. IEEE Trans.on Communications, 2017, 65 (8): 3442- 3452. |