{"id":"https://openalex.org/W2971397734","doi":"https://doi.org/10.1109/access.2019.2939048","title":"Secrecy Rate Analysis of Opportunistic User Scheduling in Uplink Networks With Potential Eavesdroppers","display_name":"Secrecy Rate Analysis of Opportunistic User Scheduling in Uplink Networks With Potential Eavesdroppers","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2971397734","doi":"https://doi.org/10.1109/access.2019.2939048","mag":"2971397734"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2939048","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2939048","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08822673.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08822673.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072052022","display_name":"Inkyu Bang","orcid":"https://orcid.org/0000-0001-7109-1999"},"institutions":[{"id":"https://openalex.org/I145808223","display_name":"Hanbat National University","ror":"https://ror.org/00x514t95","country_code":"KR","type":"education","lineage":["https://openalex.org/I145808223"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Inkyu Bang","raw_affiliation_strings":["Department of Information and Communication Engineering, Hanbat National University, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, Hanbat National University, Daejeon, South Korea","institution_ids":["https://openalex.org/I145808223"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039254133","display_name":"Bang Chul Jung","orcid":"https://orcid.org/0000-0002-4485-9592"},"institutions":[{"id":"https://openalex.org/I196345858","display_name":"Chungnam National University","ror":"https://ror.org/0227as991","country_code":"KR","type":"education","lineage":["https://openalex.org/I196345858"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Bang Chul Jung","raw_affiliation_strings":["Department of Electronics Engineering, Chungnam National University, Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Electronics Engineering, Chungnam National University, Daejeon, South Korea","institution_ids":["https://openalex.org/I196345858"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072052022"],"corresponding_institution_ids":["https://openalex.org/I145808223"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.8472,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.74575816,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"7","issue":null,"first_page":"127078","last_page":"127089"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8029030561447144},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.7719799876213074},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.6525067687034607},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6018993258476257},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5921365022659302},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2958289682865143},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06275957822799683}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8029030561447144},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.7719799876213074},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.6525067687034607},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6018993258476257},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5921365022659302},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2958289682865143},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06275957822799683},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2939048","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2939048","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08822673.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:049f40126b614e73866e13488e535095","is_oa":true,"landing_page_url":"https://doaj.org/article/049f40126b614e73866e13488e535095","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 127078-127089 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2939048","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2939048","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08822673.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2001726600","display_name":null,"funder_award_id":"NRF2019R1A2B5B01070697","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"},{"id":"https://openalex.org/G7426524187","display_name":null,"funder_award_id":"NRF2019R1A2B5B01070697","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"},{"id":"https://openalex.org/G7685055460","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"}],"funders":[{"id":"https://openalex.org/F4320321224","display_name":"Hanbat National University","ror":"https://ror.org/00x514t95"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2971397734.pdf","grobid_xml":"https://content.openalex.org/works/W2971397734.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W252932944","https://openalex.org/W949353694","https://openalex.org/W1484996440","https://openalex.org/W1510979140","https://openalex.org/W1986090422","https://openalex.org/W2019622993","https://openalex.org/W2043769961","https://openalex.org/W2048752596","https://openalex.org/W2072563372","https://openalex.org/W2073732659","https://openalex.org/W2080693943","https://openalex.org/W2081977099","https://openalex.org/W2094003855","https://openalex.org/W2102654676","https://openalex.org/W2109394932","https://openalex.org/W2128153585","https://openalex.org/W2139794367","https://openalex.org/W2144007657","https://openalex.org/W2156214717","https://openalex.org/W2156940154","https://openalex.org/W2159437533","https://openalex.org/W2368975782","https://openalex.org/W2500026973","https://openalex.org/W2511780722","https://openalex.org/W2531554253","https://openalex.org/W2553476303","https://openalex.org/W2558778358","https://openalex.org/W2586599018","https://openalex.org/W2801886182","https://openalex.org/W2891771259","https://openalex.org/W2931923259","https://openalex.org/W2934257136","https://openalex.org/W3103382732","https://openalex.org/W3145128584","https://openalex.org/W4246219036"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2548963335","https://openalex.org/W2475541339","https://openalex.org/W2159941915","https://openalex.org/W565335793","https://openalex.org/W2363071176"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,17,117,141],"investigate":[4,181],"two":[5,129],"user":[6,10,13,28,34,54,73],"scheduling":[7,14,29,55,130,200],"algorithms":[8,131],"(optimal":[9],"and":[11,69,151,204],"threshold-based":[12,53],"algorithms)":[15],"when":[16,132],"consider":[18],"potential":[19,67],"eavesdroppers":[20,68],"in":[21,92,188,202,217],"an":[22,89,177],"uplink":[23],"wiretap":[24,190,219],"network.":[25],"The":[26,85],"optimal":[27,90],"(OUS)":[30],"algorithm":[31,57,87,100,109,150],"selects":[32,71],"the":[33,37,49,52,60,64,72,82,98,107,120,124,133,143,148,160,165,182,189,193,207,213,218,223],"who":[35,76],"has":[36],"maximum":[38],"secrecy":[39,95,103,126,145,162,195],"rate,":[40,96],"based":[41],"on":[42,81,192],"channel":[43,185,214],"feedback":[44,112],"from":[45,63],"all":[46],"users.":[47],"On":[48],"other":[50],"hand,":[51],"(TUS)":[56],"first":[58],"considers":[59],"information":[61,83],"leakage":[62],"users":[65],"to":[66,138,154,180,198],"then":[70],"among":[74],"candidates":[75],"satisfy":[77],"a":[78],"threshold":[79,156],"criterion":[80],"leakage.":[84],"OUS":[86,108,203,224],"shows":[88],"performance":[91],"terms":[93],"of":[94,123,128,147,164,184],"but":[97],"TUS":[99,149,166,205,208],"can":[101],"achieve":[102],"rate":[104,127,146,163],"comparable":[105],"with":[106,110,222],"reduced":[111],"overhead.":[113],"For":[114],"main":[115],"contributions,":[116],"mathematically":[118],"analyze":[119],"asymptotic":[121],"behavior":[122],"achievable":[125,161],"signal-to-noise":[134],"ratio":[135],"(SNR)":[136],"approaches":[137],"infinity.":[139],"Further,":[140],"derive":[142],"approximated":[144],"propose":[152],"criteria":[153],"determine":[155],"values":[157],"which":[158],"maximize":[159],"algorithm.":[167],"We":[168,175],"verify":[169],"our":[170],"analytical":[171],"results":[172],"through":[173],"simulations.":[174],"perform":[176],"extra":[178],"simulation":[179],"effect":[183],"estimation":[186,215],"error":[187,216],"links":[191],"average":[194],"rate.":[196],"Due":[197],"different":[199],"principles":[201],"schemes,":[206],"scheme":[209],"yields":[210],"robustness":[211],"against":[212],"links,":[220],"compared":[221],"schemes.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
