{"id":"https://openalex.org/W2540385438","doi":"https://doi.org/10.1109/acssc.2011.6189986","title":"Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise","display_name":"Safe convex approximation to outage-based MISO secrecy rate optimization under imperfect CSI and with artificial noise","publication_year":2011,"publication_date":"2011-11-01","ids":{"openalex":"https://openalex.org/W2540385438","doi":"https://doi.org/10.1109/acssc.2011.6189986","mag":"2540385438"},"language":"en","primary_location":{"id":"doi:10.1109/acssc.2011.6189986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acssc.2011.6189986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100429879","display_name":"Qiang Li","orcid":"https://orcid.org/0000-0001-5609-3320"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiang Li","raw_affiliation_strings":["Department Electronic Engineering, Chinese University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department Electronic Engineering, Chinese University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016986549","display_name":"Wing\u2010Kin Ma","orcid":"https://orcid.org/0000-0001-7314-3537"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wing-Kin Ma","raw_affiliation_strings":["Department Electronic Engineering, Chinese University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department Electronic Engineering, Chinese University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105881332","display_name":"Anthony Man\u2013Cho So","orcid":"https://orcid.org/0000-0003-2588-7851"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anthony Man-Cho So","raw_affiliation_strings":["Department of System Engineering & Engineering Management, Chinese University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of System Engineering & Engineering Management, Chinese University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100429879"],"corresponding_institution_ids":["https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":3.9745,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.94220711,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"207","last_page":"211"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.8597354292869568},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.7358320951461792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6669424176216125},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.6080721020698547},{"id":"https://openalex.org/keywords/imperfect","display_name":"Imperfect","score":0.5953080654144287},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.5895677208900452},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.5682265162467957},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5593443512916565},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.5396419167518616},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.5143500566482544},{"id":"https://openalex.org/keywords/convex-optimization","display_name":"Convex optimization","score":0.4768870174884796},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4372449815273285},{"id":"https://openalex.org/keywords/regular-polygon","display_name":"Regular polygon","score":0.33976536989212036},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.33540019392967224},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21549677848815918},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1694629192352295},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1645885407924652},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0646548867225647}],"concepts":[{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.8597354292869568},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.7358320951461792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6669424176216125},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.6080721020698547},{"id":"https://openalex.org/C2780310539","wikidata":"https://www.wikidata.org/wiki/Q12547192","display_name":"Imperfect","level":2,"score":0.5953080654144287},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.5895677208900452},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.5682265162467957},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5593443512916565},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.5396419167518616},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.5143500566482544},{"id":"https://openalex.org/C157972887","wikidata":"https://www.wikidata.org/wiki/Q463359","display_name":"Convex optimization","level":3,"score":0.4768870174884796},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4372449815273285},{"id":"https://openalex.org/C112680207","wikidata":"https://www.wikidata.org/wiki/Q714886","display_name":"Regular polygon","level":2,"score":0.33976536989212036},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.33540019392967224},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21549677848815918},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1694629192352295},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1645885407924652},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0646548867225647},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acssc.2011.6189986","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acssc.2011.6189986","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W181733065","https://openalex.org/W1577408952","https://openalex.org/W2017249840","https://openalex.org/W2042599231","https://openalex.org/W2043769961","https://openalex.org/W2079364662","https://openalex.org/W2092086200","https://openalex.org/W2113706820","https://openalex.org/W2116892602","https://openalex.org/W2125884950","https://openalex.org/W2133406100","https://openalex.org/W2135137654","https://openalex.org/W2136587597","https://openalex.org/W2138903952","https://openalex.org/W2156214717","https://openalex.org/W2156577211","https://openalex.org/W2170733622","https://openalex.org/W2607549630","https://openalex.org/W2798766386","https://openalex.org/W2949672874","https://openalex.org/W4244633107","https://openalex.org/W4293702014","https://openalex.org/W6673604286"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W4391308034","https://openalex.org/W2951619176","https://openalex.org/W2010804147","https://openalex.org/W2145047504","https://openalex.org/W4285288574","https://openalex.org/W1569570192"],"abstract_inverted_index":{"Consider":[0],"a":[1,90],"scenario":[2],"in":[3],"which":[4],"an":[5,42,55],"MISO":[6],"channel":[7,18],"is":[8,60,87],"overheard":[9],"by":[10,106],"multiple":[11],"single-antenna":[12],"eavesdroppers.":[13],"The":[14,34,83,99],"transmitter":[15],"has":[16,27],"perfect":[17],"state":[19],"information":[20],"(CSI)":[21],"with":[22,30],"the":[23,31,49,69,96,102],"legitimate":[24],"channel,":[25],"but":[26],"imperfect":[28],"CSI":[29,35,50],"eavesdroppers'":[32],"channels.":[33],"uncertainties":[36,51],"are":[37,52,78,104],"assumed":[38],"stochastic.":[39],"We":[40],"formulate":[41],"artificial-noise":[43],"(AN)-aided":[44],"secrecy-rate":[45],"maximization":[46],"problem":[47],"where":[48],"handled":[53],"using":[54],"outage-based":[56,75],"formulation.":[57],"Our":[58],"aim":[59],"to":[61,81,88,95],"find,":[62],"for":[63,68],"this":[64],"problem,":[65],"tractable":[66],"designs":[67],"transmit":[70],"and":[71],"AN":[72],"covariances.":[73],"Unfortunately,":[74],"optimization":[76],"problems":[77],"generally":[79],"difficult":[80],"solve.":[82],"main":[84],"contribution":[85],"here":[86],"derive":[89],"safe,":[91],"convex":[92],"optimization-based,":[93],"approximation":[94],"considered":[97],"problem.":[98],"advantages":[100],"of":[101],"method":[103],"shown":[105],"simulations.":[107]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
