{"id":"https://openalex.org/W7138946894","doi":"https://doi.org/10.1109/globecom59602.2025.11432090","title":"Performance Analysis of RIS-Assisted Covert Rate-Splitting Multiple Access","display_name":"Performance Analysis of RIS-Assisted Covert Rate-Splitting Multiple Access","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7138946894","doi":"https://doi.org/10.1109/globecom59602.2025.11432090"},"language":null,"primary_location":{"id":"doi:10.1109/globecom59602.2025.11432090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130175845","display_name":"Yanyu Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanyu Cheng","raw_affiliation_strings":["Hangzhou Dianzi University,School of Cyberspace,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Dianzi University,School of Cyberspace,Hangzhou,China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007029807","display_name":"Hao Li","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Li","raw_affiliation_strings":["Hangzhou Dianzi University,School of Cyberspace,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Dianzi University,School of Cyberspace,Hangzhou,China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129965147","display_name":"Zhen Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Wang","raw_affiliation_strings":["Hangzhou Dianzi University,School of Cyberspace,Hangzhou,China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Dianzi University,School of Cyberspace,Hangzhou,China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129924560","display_name":"Dusit Niyato","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dusit Niyato","raw_affiliation_strings":["Nanyang Technological University,College of Computing and Data Science,Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University,College of Computing and Data Science,Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5130175845"],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.6802317,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"5193","last_page":"5198"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.011900000274181366,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.002099999925121665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7451000213623047},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.7376000285148621},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5324000120162964},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.4616999924182892},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4424999952316284},{"id":"https://openalex.org/keywords/information-transmission","display_name":"Information transmission","score":0.3853999972343445},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.3614000082015991}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7451000213623047},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.7376000285148621},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7171000242233276},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5324000120162964},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5146999955177307},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.4616999924182892},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4424999952316284},{"id":"https://openalex.org/C2983568541","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Information transmission","level":2,"score":0.3853999972343445},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.3614000082015991},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35040000081062317},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C90559484","wikidata":"https://www.wikidata.org/wiki/Q778379","display_name":"Expression (computer science)","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.289000004529953},{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.2816999852657318},{"id":"https://openalex.org/C2779664074","wikidata":"https://www.wikidata.org/wiki/Q3518405","display_name":"Terminal (telecommunication)","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25619998574256897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom59602.2025.11432090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4838971197605133}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2990747873","https://openalex.org/W3022663626","https://openalex.org/W3135670366","https://openalex.org/W3165137906","https://openalex.org/W3185268715","https://openalex.org/W3198753883","https://openalex.org/W4230959423","https://openalex.org/W4282018642","https://openalex.org/W4361802267","https://openalex.org/W4362500847","https://openalex.org/W4385627079","https://openalex.org/W4388052971","https://openalex.org/W4392883995","https://openalex.org/W4393185127","https://openalex.org/W4399990488","https://openalex.org/W4400878269"],"related_works":[],"abstract_inverted_index":{"This":[0,24],"paper":[1],"investigates":[2],"a":[3,16,22,58],"downlink":[4],"covert":[5,34,50],"communication":[6,51,83],"system":[7,31,84],"based":[8],"on":[9],"rate-splitting":[10],"multiple":[11],"access":[12],"(RSMA),":[13],"assisted":[14],"by":[15],"reconfigurable":[17],"intelligent":[18],"surface":[19],"(RIS)":[20],"and":[21,36,44,78],"jammer.":[23],"scheme":[25],"treats":[26],"every":[27],"user":[28],"in":[29,53],"the":[30,49,63,73,76,79,82],"as":[32],"requiring":[33],"transmission":[35],"splits":[37],"each":[38],"user's":[39],"message":[40],"stream":[41],"into":[42],"common":[43],"private":[45],"parts":[46],"to":[47],"meet":[48],"demands":[52],"multi-user":[54],"scenarios.":[55],"We":[56],"derive":[57],"closed-form":[59],"approximate":[60],"expression":[61],"for":[62],"average":[64],"minimum":[65],"detection":[66],"error":[67],"probability":[68],"(AMDEP).":[69],"Through":[70],"extensive":[71],"simulations,":[72],"correctness":[74],"of":[75,81],"analysis":[77],"covertness":[80],"are":[85],"validated.":[86]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
