{"id":"https://openalex.org/W2125326431","doi":"https://doi.org/10.1109/glocom.2009.5425556","title":"Secure Joint Source-Channel Coding for Quasi-Static Fading Channels","display_name":"Secure Joint Source-Channel Coding for Quasi-Static Fading Channels","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2125326431","doi":"https://doi.org/10.1109/glocom.2009.5425556","mag":"2125326431"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2009.5425556","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2009.5425556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030858163","display_name":"Tony Q. S. Quek","orcid":"https://orcid.org/0000-0002-4037-3149"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Tony Q. S. Quek","raw_affiliation_strings":["Institute for Infocomm Research, Singapore","Inst. for Infocomm Res., Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Inst. for Infocomm Res., Singapore","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001523380","display_name":"Kiran T. Gowda","orcid":null},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Kiran Thimme Gowda","raw_affiliation_strings":["Mobile Communications Department, Eur\u00e9com Institute, Sophia-Antipolis, France","Eurecom Inst., Sophia-Antipolis, France"],"affiliations":[{"raw_affiliation_string":"Mobile Communications Department, Eur\u00e9com Institute, Sophia-Antipolis, France","institution_ids":["https://openalex.org/I1902872"]},{"raw_affiliation_string":"Eurecom Inst., Sophia-Antipolis, France","institution_ids":["https://openalex.org/I1902872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007557286","display_name":"Hyundong Shin","orcid":"https://orcid.org/0000-0003-3364-8084"},"institutions":[{"id":"https://openalex.org/I35928602","display_name":"Kyung Hee University","ror":"https://ror.org/01zqcg218","country_code":"KR","type":"education","lineage":["https://openalex.org/I35928602"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyundong Shin","raw_affiliation_strings":["School of Electronics and Information, Kyung Hee University, Gyeonggi, South Korea","Kyung Hee Univ., Gyeonggi-do, Korea"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information, Kyung Hee University, Gyeonggi, South Korea","institution_ids":["https://openalex.org/I35928602"]},{"raw_affiliation_string":"Kyung Hee Univ., Gyeonggi-do, Korea","institution_ids":["https://openalex.org/I35928602"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5030858163"],"corresponding_institution_ids":["https://openalex.org/I3005327000"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.14450168,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"54","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.756929337978363},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.7116521000862122},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6768131256103516},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6013941764831543},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.584716796875},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.5205965042114258},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5122146010398865},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.48785924911499023},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4599224030971527},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4400290846824646},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.42230430245399475},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.35351628065109253},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.28735870122909546},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1971009075641632},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17655596137046814},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1150994598865509}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.756929337978363},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.7116521000862122},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6768131256103516},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6013941764831543},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.584716796875},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.5205965042114258},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5122146010398865},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.48785924911499023},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4599224030971527},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4400290846824646},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.42230430245399475},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.35351628065109253},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.28735870122909546},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1971009075641632},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17655596137046814},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1150994598865509},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2009.5425556","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2009.5425556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2007529001","https://openalex.org/W2013409848","https://openalex.org/W2043769961","https://openalex.org/W2098257210","https://openalex.org/W2099111195","https://openalex.org/W2099884758","https://openalex.org/W2109394932","https://openalex.org/W2130334496","https://openalex.org/W2136040471","https://openalex.org/W2145577744","https://openalex.org/W2156214717","https://openalex.org/W2159687282","https://openalex.org/W2161479888","https://openalex.org/W2172233962","https://openalex.org/W2258157321"],"related_works":["https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2340481533","https://openalex.org/W2898567960","https://openalex.org/W2036210457","https://openalex.org/W2369043755","https://openalex.org/W2039752281","https://openalex.org/W1608200561"],"abstract_inverted_index":{"Joint":[0],"source-channel":[1,57,160],"coding":[2,161],"has":[3],"been":[4],"shown":[5],"to":[6,22,35,171,177],"yield":[7],"optimal":[8],"end-to-end":[9,52],"performance":[10,53],"in":[11,70,175],"terms":[12],"of":[13,27,54,78,99,148,168],"overall":[14],"expected":[15],"distortion":[16,109,181],"for":[17],"quasi-static":[18],"fading":[19],"channels.":[20],"Due":[21],"the":[23,28,47,51,55,64,90,97,116,126,146,166,179],"inherent":[24],"broadcast":[25],"nature":[26],"wireless":[29,31],"medium,":[30],"communications":[32],"are":[33],"susceptible":[34],"eavesdropping.":[36],"Thus,":[37],"it":[38],"is":[39,134],"unclear":[40],"how":[41],"imposing":[42],"additional":[43,117],"secrecy":[44,104,108,118,133,169,180],"constraint":[45],"on":[46,125,140,145],"system":[48],"will":[49],"affect":[50],"joint":[56],"coding.":[58],"In":[59,89,154],"this":[60,137,156],"paper,":[61],"we":[62,95],"consider":[63],"information":[65],"theoretic":[66],"secure":[67,101],"source":[68,80,150],"transmission":[69,151],"a":[71,79,82,86,122],"classical":[72],"three":[73],"node":[74],"wiretap":[75],"channel,":[76],"consisting":[77],"node,":[81,84],"destination":[83],"and":[85,107],"wiretapper":[87],"node.":[88],"high":[91],"signal-to-noise":[92],"ratio":[93],"regime,":[94],"quantify":[96],"cost":[98],"providing":[100],"transmissions":[102],"through":[103],"outage":[105],"probability":[106],"exponent.":[110,182],"Our":[111],"results":[112],"show":[113],"that":[114,159],"with":[115],"constraint,":[119],"there":[120],"exists":[121],"lower":[123,138],"bound":[124,139],"bandwidth":[127,141],"expansion":[128,142],"factor,":[129],"below":[130],"which":[131],"perfect":[132],"impossible.":[135],"Moreover,":[136],"factor":[143],"depends":[144],"type":[147],"layered":[149],"strategy":[152],"used.":[153],"summary,":[155],"work":[157],"indicates":[158],"strategies":[162],"as":[163,165],"well":[164],"level":[167],"need":[170],"be":[172],"carefully":[173],"designed":[174],"order":[176],"maximize":[178]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
