{"id":"https://openalex.org/W2783078502","doi":"https://doi.org/10.1109/glocom.2017.8253998","title":"Secure Transmission in MISOME Wiretap Channels with Half and Full-Duplex Active Eavesdroppers","display_name":"Secure Transmission in MISOME Wiretap Channels with Half and Full-Duplex Active Eavesdroppers","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2783078502","doi":"https://doi.org/10.1109/glocom.2017.8253998","mag":"2783078502"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2017.8253998","is_oa":false,"landing_page_url":"http://doi.org/10.1109/glocom.2017.8253998","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100688855","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0002-6104-7908"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wei Wang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078754231","display_name":"Kah Chan Teh","orcid":"https://orcid.org/0000-0002-1973-2565"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kah Chan Teh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102889190","display_name":"Sheng Luo","orcid":"https://orcid.org/0000-0003-0541-0298"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sheng Luo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5034147678","display_name":"Kwok Hung Li","orcid":"https://orcid.org/0000-0003-1570-250X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kwok Hung Li","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100688855"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.43,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67051805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11716","display_name":"Random Matrices and Applications","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6358173489570618},{"id":"https://openalex.org/keywords/poisson-point-process","display_name":"Poisson point process","score":0.5779341459274292},{"id":"https://openalex.org/keywords/stochastic-geometry","display_name":"Stochastic geometry","score":0.5753960609436035},{"id":"https://openalex.org/keywords/duplex","display_name":"Duplex (building)","score":0.5509350895881653},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5369702577590942},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.47282421588897705},{"id":"https://openalex.org/keywords/poisson-distribution","display_name":"Poisson distribution","score":0.46742647886276245},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.46131041646003723},{"id":"https://openalex.org/keywords/cumulative-distribution-function","display_name":"Cumulative distribution function","score":0.45065969228744507},{"id":"https://openalex.org/keywords/signal-to-noise-ratio","display_name":"Signal-to-noise ratio (imaging)","score":0.4499550461769104},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.44788146018981934},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.416644811630249},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4116586446762085},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.39004987478256226},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3630232512950897},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33479970693588257},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23502710461616516},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22243595123291016},{"id":"https://openalex.org/keywords/probability-density-function","display_name":"Probability density function","score":0.209702730178833},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.1428302526473999},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.13892731070518494},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.12453651428222656},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.11218589544296265}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6358173489570618},{"id":"https://openalex.org/C16757284","wikidata":"https://www.wikidata.org/wiki/Q1145117","display_name":"Poisson point process","level":3,"score":0.5779341459274292},{"id":"https://openalex.org/C31243852","wikidata":"https://www.wikidata.org/wiki/Q1666739","display_name":"Stochastic geometry","level":2,"score":0.5753960609436035},{"id":"https://openalex.org/C99611785","wikidata":"https://www.wikidata.org/wiki/Q6453233","display_name":"Duplex (building)","level":3,"score":0.5509350895881653},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5369702577590942},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.47282421588897705},{"id":"https://openalex.org/C100906024","wikidata":"https://www.wikidata.org/wiki/Q205692","display_name":"Poisson distribution","level":2,"score":0.46742647886276245},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.46131041646003723},{"id":"https://openalex.org/C103784038","wikidata":"https://www.wikidata.org/wiki/Q386228","display_name":"Cumulative distribution function","level":3,"score":0.45065969228744507},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.4499550461769104},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.44788146018981934},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.416644811630249},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4116586446762085},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.39004987478256226},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3630232512950897},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33479970693588257},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23502710461616516},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22243595123291016},{"id":"https://openalex.org/C197055811","wikidata":"https://www.wikidata.org/wiki/Q207522","display_name":"Probability density function","level":2,"score":0.209702730178833},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.1428302526473999},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.13892731070518494},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.12453651428222656},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.11218589544296265},{"id":"https://openalex.org/C552990157","wikidata":"https://www.wikidata.org/wiki/Q7430","display_name":"DNA","level":2,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2017.8253998","is_oa":false,"landing_page_url":"http://doi.org/10.1109/glocom.2017.8253998","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1970334960","https://openalex.org/W2007529001","https://openalex.org/W2049312299","https://openalex.org/W2070432635","https://openalex.org/W2080147975","https://openalex.org/W2086582032","https://openalex.org/W2093554016","https://openalex.org/W2103063389","https://openalex.org/W2112513314","https://openalex.org/W2128153585","https://openalex.org/W2133406100","https://openalex.org/W2135137654","https://openalex.org/W2184413915","https://openalex.org/W2226740399","https://openalex.org/W2293862360","https://openalex.org/W2473925222","https://openalex.org/W2530027684","https://openalex.org/W2536073501","https://openalex.org/W2566316543","https://openalex.org/W2586599018"],"related_works":["https://openalex.org/W2023833916","https://openalex.org/W2963230071","https://openalex.org/W2342335616","https://openalex.org/W1607049962","https://openalex.org/W1674302630","https://openalex.org/W2430493507","https://openalex.org/W2799837476","https://openalex.org/W2751265095","https://openalex.org/W4321343625","https://openalex.org/W2228745896"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"the":[3,13,56,68,74,81,88,103,119,126,145],"security":[4],"issue":[5],"in":[6,12,40],"a":[7,29,42,50,99,136],"multi-":[8],"input-single-output":[9],"(MISO)":[10],"system":[11],"presence":[14],"of":[15,36,70,87,102,123,129],"multiple":[16],"randomly":[17],"distributed":[18,26],"eavesdroppers":[19],"(Eves)":[20],"is":[21,106],"investigated.":[22],"The":[23],"Eves":[24,131],"are":[25,111,132,141],"according":[27],"to":[28,66,143],"Poisson":[30],"Point":[31],"Process":[32],"(PPP)":[33],"and":[34,60,95,125],"each":[35],"them":[37],"can":[38,54],"operate":[39],"either":[41],"half-duplex":[43],"(HD)":[44],"or":[45],"full-duplex":[46],"(FD)":[47],"mode.":[48],"For":[49],"FD-mode":[51,130],"Eve,":[52],"it":[53],"overhear":[55],"secret":[57],"information":[58],"transmission":[59],"send":[61],"some":[62],"jamming":[63],"signals":[64],"simultaneously":[65],"degrade":[67],"reception":[69],"Bob.":[71],"Based":[72],"on":[73],"stochastic":[75],"geometry":[76],"method,":[77],"we":[78],"first":[79],"derive":[80],"cumulative":[82],"distribution":[83],"function":[84],"(cdf)":[85],"expressions":[86],"signal-to-interference-plus-":[89],"noise":[90],"ratio":[91],"(SINR)":[92],"for":[93],"Bob":[94],"Eves.":[96],"Following":[97],"that,":[98],"lower":[100],"bound":[101],"intercept":[104],"probability":[105],"obtained.":[107],"Some":[108],"important":[109],"properties":[110],"derived,":[112],"which":[113],"provide":[114],"very":[115],"useful":[116],"insights.":[117],"Finally,":[118],"optimal":[120,127],"power":[121],"allocation":[122],"Alice":[124],"fraction":[128],"solved":[133],"by":[134],"using":[135],"game-theoretical":[137],"approach.":[138],"Simulation":[139],"results":[140],"shown":[142],"validate":[144],"theoretical":[146],"analysis.":[147]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
