{"id":"https://openalex.org/W7143811162","doi":"https://doi.org/10.1049/cmu2.70140","title":"Artificial Noise Aided Directional Modulation with Multilog Frequency Diverse Array","display_name":"Artificial Noise Aided Directional Modulation with Multilog Frequency Diverse Array","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7143811162","doi":"https://doi.org/10.1049/cmu2.70140"},"language":"en","primary_location":{"id":"doi:10.1049/cmu2.70140","is_oa":true,"landing_page_url":"https://doi.org/10.1049/cmu2.70140","pdf_url":null,"source":{"id":"https://openalex.org/S85427048","display_name":"IET Communications","issn_l":"1751-8628","issn":["1751-8628","1751-8636"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1049/cmu2.70140","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100396339","display_name":"Ji Liu","orcid":"https://orcid.org/0000-0003-4710-5697"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I194716290","display_name":"China Academy of Space Technology","ror":"https://ror.org/025397a59","country_code":"CN","type":"government","lineage":["https://openalex.org/I194716290","https://openalex.org/I2802615301"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ji Liu","raw_affiliation_strings":["China Academy of Space Technology (Xi\u2019an) Xi'an China","School of Telecommunications Engineering Xidian University Xi'an China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"China Academy of Space Technology (Xi\u2019an) Xi'an China","institution_ids":["https://openalex.org/I194716290"]},{"raw_affiliation_string":"School of Telecommunications Engineering Xidian University Xi'an China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5131123462","display_name":"Yue Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Xiao","raw_affiliation_strings":["National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China  Chengdu China"],"raw_orcid":"https://orcid.org/0000-0002-2127-8947","affiliations":[{"raw_affiliation_string":"National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China  Chengdu China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055027028","display_name":"Yu Wang","orcid":"https://orcid.org/0000-0002-6755-445X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Wang","raw_affiliation_strings":["School of Telecommunications Engineering Xidian University Xi'an China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Telecommunications Engineering Xidian University Xi'an China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011694803","display_name":"X. Lei","orcid":"https://orcid.org/0009-0001-6499-2745"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xia Lei","raw_affiliation_strings":["National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China  Chengdu China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China  Chengdu China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100396339"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I194716290"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":{"value":2000,"currency":"EUR","value_usd":2200},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.71049362,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.5946999788284302,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.5946999788284302,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.37139999866485596,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.01140000019222498,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.8544999957084656},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.64410001039505},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.5893999934196472},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5482000112533569},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5422000288963318},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5112000107765198},{"id":"https://openalex.org/keywords/modulation","display_name":"Modulation (music)","score":0.5074999928474426},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4952000081539154}],"concepts":[{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.8544999957084656},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7512000203132629},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.64410001039505},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.5893999934196472},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5482000112533569},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5422000288963318},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.5273000001907349},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5112000107765198},{"id":"https://openalex.org/C123079801","wikidata":"https://www.wikidata.org/wiki/Q750240","display_name":"Modulation (music)","level":2,"score":0.5074999928474426},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4952000081539154},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4925999939441681},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4341000020503998},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42559999227523804},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.4212999939918518},{"id":"https://openalex.org/C11930861","wikidata":"https://www.wikidata.org/wiki/Q181417","display_name":"Frequency modulation","level":3,"score":0.41019999980926514},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3725000023841858},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.32260000705718994},{"id":"https://openalex.org/C2989335485","wikidata":"https://www.wikidata.org/wiki/Q17130189","display_name":"Transmission rate","level":3,"score":0.30090001225471497},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.29580000042915344},{"id":"https://openalex.org/C40409654","wikidata":"https://www.wikidata.org/wiki/Q375889","display_name":"Orthogonal frequency-division multiplexing","level":3,"score":0.2924000024795532},{"id":"https://openalex.org/C137270730","wikidata":"https://www.wikidata.org/wiki/Q120811","display_name":"Detection theory","level":3,"score":0.2757999897003174},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.2694999873638153}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1049/cmu2.70140","is_oa":true,"landing_page_url":"https://doi.org/10.1049/cmu2.70140","pdf_url":null,"source":{"id":"https://openalex.org/S85427048","display_name":"IET Communications","issn_l":"1751-8628","issn":["1751-8628","1751-8636"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1049/cmu2.70140","is_oa":true,"landing_page_url":"https://doi.org/10.1049/cmu2.70140","pdf_url":null,"source":{"id":"https://openalex.org/S85427048","display_name":"IET Communications","issn_l":"1751-8628","issn":["1751-8628","1751-8636"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Communications","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.44692185521125793,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G6830670964","display_name":null,"funder_award_id":"2020YFB1807203","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1963684270","https://openalex.org/W1971370354","https://openalex.org/W1978572848","https://openalex.org/W2007529001","https://openalex.org/W2033783016","https://openalex.org/W2062608344","https://openalex.org/W2070268943","https://openalex.org/W2142143226","https://openalex.org/W2151807636","https://openalex.org/W2156214717","https://openalex.org/W2161963928","https://openalex.org/W2165468651","https://openalex.org/W2286924897","https://openalex.org/W2328196818","https://openalex.org/W2339271614","https://openalex.org/W2342988270","https://openalex.org/W2549326866","https://openalex.org/W2558979123","https://openalex.org/W2578975026","https://openalex.org/W2916589698","https://openalex.org/W2963100680","https://openalex.org/W3014163115","https://openalex.org/W4280652998","https://openalex.org/W4362715001","https://openalex.org/W4393241042","https://openalex.org/W4394897019","https://openalex.org/W4403675534","https://openalex.org/W4410852476","https://openalex.org/W4413359333","https://openalex.org/W4414229385"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Directional":[1],"modulation":[2],"(DM)":[3],"has":[4],"been":[5],"widely":[6],"studied":[7],"as":[8],"a":[9,45,64],"promising":[10],"technique":[11],"for":[12,101,132],"enhancing":[13],"physical":[14],"layer":[15],"security":[16],"(PLS).":[17],"In":[18],"particular,":[19],"DM":[20,60,139],"combined":[21],"with":[22],"frequency":[23,66],"diverse":[24,67],"arrays":[25],"(FDA)":[26],"enables":[27],"directional":[28],"transmission":[29],"on":[30,63],"the":[31,35,79,86,98,102,109,113,120,133],"two\u2010dimensional":[32],"plane.":[33],"However,":[34],"inevitable":[36],"presence":[37],"of":[38,47,112],"sidelobes":[39],"in":[40],"FDA":[41],"patterns":[42],"still":[43],"poses":[44],"risk":[46],"information":[48],"leakage":[49,87],"to":[50,85,93],"eavesdroppers.":[51],"To":[52],"address":[53],"this":[54],"limitation,":[55],"we":[56,96],"propose":[57],"an":[58],"artificial\u2010noise\u2010aided":[59],"scheme":[61,81,122],"based":[62],"multilog":[65],"array":[68],"(AN\u2010DM\u2010MFDA).":[69],"Unlike":[70],"conventiona":[71],"methods":[72],"that":[73,119],"uniformly":[74],"transmit":[75],"artificial":[76],"noise":[77],"(AN),":[78],"proposed":[80,121],"strategically":[82],"allocates":[83],"AN":[84],"sidelobes,":[88],"thereby":[89],"reducing":[90],"their":[91],"vulnerability":[92],"interception.":[94],"Furthermore,":[95],"derive":[97],"theoretical":[99],"expressions":[100],"average":[103],"bit":[104],"error":[105],"rate":[106],"(BER)":[107],"and":[108],"secrecy":[110,125],"capacity":[111],"developed":[114],"system.":[115],"Simulation":[116],"results":[117],"confirm":[118],"achieves":[123],"stronger":[124],"protection":[126],"while":[127],"maintaining":[128],"reliable":[129],"detection":[130],"performance":[131],"legitimate":[134],"user,":[135],"outperforming":[136],"existing":[137],"AN\u2010aided":[138],"approaches.":[140]},"counts_by_year":[],"updated_date":"2026-04-01T02:39:33.593085","created_date":"2026-04-01T00:00:00"}
