{"id":"https://openalex.org/W2793647231","doi":"https://doi.org/10.1109/ccnc.2018.8319269","title":"Artificial noise-aided secure beamforming for multigroup multicast","display_name":"Artificial noise-aided secure beamforming for multigroup multicast","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2793647231","doi":"https://doi.org/10.1109/ccnc.2018.8319269","mag":"2793647231"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc.2018.8319269","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2018.8319269","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 15th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082160561","display_name":"Wanjik Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Wanjik Kim","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043822936","display_name":"Sukjong Ha","orcid":null},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sukjong Ha","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074185086","display_name":"Jeongwan Koh","orcid":"https://orcid.org/0000-0002-3539-8704"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jeongwan Koh","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062994489","display_name":"Joonhyuk Kang","orcid":"https://orcid.org/0000-0002-5508-3742"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Joonhyuk Kang","raw_affiliation_strings":["Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea"],"affiliations":[{"raw_affiliation_string":"Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea","institution_ids":["https://openalex.org/I157485424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082160561"],"corresponding_institution_ids":["https://openalex.org/I157485424"],"apc_list":null,"apc_paid":null,"fwci":0.1301,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.4572124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.874219536781311},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.7927495837211609},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7607818841934204},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.7507296204566956},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.5649572610855103},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.4929952323436737},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4722270965576172},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.42091989517211914},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.38440605998039246},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2521059811115265},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.15299898386001587},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13166514039039612},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10568034648895264}],"concepts":[{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.874219536781311},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.7927495837211609},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7607818841934204},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.7507296204566956},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.5649572610855103},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.4929952323436737},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4722270965576172},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.42091989517211914},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38440605998039246},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2521059811115265},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.15299898386001587},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13166514039039612},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10568034648895264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc.2018.8319269","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc.2018.8319269","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 15th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1985665652","https://openalex.org/W2013605702","https://openalex.org/W2043769961","https://openalex.org/W2116892602","https://openalex.org/W2133406100","https://openalex.org/W2144007657","https://openalex.org/W2516510987","https://openalex.org/W2588151259","https://openalex.org/W2610984562"],"related_works":["https://openalex.org/W4391308034","https://openalex.org/W2765236478","https://openalex.org/W2951619176","https://openalex.org/W4360996312","https://openalex.org/W3159852908","https://openalex.org/W2529506699","https://openalex.org/W2994678687","https://openalex.org/W4390240227","https://openalex.org/W3036307543","https://openalex.org/W2766792752"],"abstract_inverted_index":{"We":[0,79],"investigate":[1],"the":[2,14,26,33,46,73,77,81,85,120,137,146],"physical":[3],"layer":[4],"security":[5],"for":[6,40,55,149],"multiple-input":[7],"single-output":[8],"(MISO)":[9],"multigroup":[10],"multicast":[11,34],"system":[12,35,142],"in":[13,84,102],"presence":[15],"of":[16,32,48,76,87,140],"multiple":[17],"eavesdroppers":[18],"(Eves).":[19],"To":[20],"elaborate,":[21],"we":[22,44,63,108,118],"aim":[23],"to":[24,71,95,98,104,114],"tackle":[25,105],"secrecy":[27,74,138],"rate":[28,75,139],"maximization":[29,122],"(SRM)":[30],"problem":[31,83,91,113],"by":[36,58],"proposing":[37],"an":[38],"algorithm":[39,124,135,148],"secure":[41,150],"beam-forming.":[42],"Here,":[43],"adopt":[45],"concept":[47],"artificial":[49],"noise":[50,60],"(AN)":[51],"which":[52,92],"is":[53,93],"used":[54],"disturbing":[56],"Eves":[57],"sending":[59],"deliberately.":[61],"Thus,":[62],"simultaneously":[64],"design":[65],"beamforming":[66],"vectors":[67],"and":[68,117,125,144],"AN":[69],"vector":[70],"maximize":[72],"system.":[78],"formulate":[80],"SRM":[82,112],"form":[86],"non-convex":[88],"max-min":[89],"fair":[90],"hard":[94],"solve":[96],"due":[97],"its":[99],"non-convexity.":[100],"Therefore,":[101],"order":[103],"this":[106,111],"problem,":[107],"first":[109],"reformulate":[110],"epigraph":[115],"form,":[116],"utilize":[119],"minorization":[121],"(MM)":[123],"rank-1":[126],"reduction":[127],"technique.":[128],"Simulation":[129],"results":[130],"show":[131],"that":[132],"our":[133],"proposed":[134],"improves":[136],"given":[141],"model":[143],"outperforms":[145],"conventional":[147],"beamforming.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
