Proactive Eavesdropping With Jamming Power Allocation in Training-Based Suspicious Communications | IEEE Journals & Magazine | IEEE Xplore