{"id":"https://openalex.org/W2782809764","doi":"https://doi.org/10.1109/glocom.2017.8254497","title":"Artificial Noise Aided Secure Multicasting Design under the Secrecy Outage Probability Constraint","display_name":"Artificial Noise Aided Secure Multicasting Design under the Secrecy Outage Probability Constraint","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2782809764","doi":"https://doi.org/10.1109/glocom.2017.8254497","mag":"2782809764"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2017.8254497","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8254497","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017233409","display_name":"Bo Wang","orcid":"https://orcid.org/0000-0001-7189-1531"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Wang","raw_affiliation_strings":["MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076885168","display_name":"Pengcheng Mu","orcid":"https://orcid.org/0000-0001-9208-9900"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengcheng Mu","raw_affiliation_strings":["MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026374722","display_name":"Weile Zhang","orcid":"https://orcid.org/0000-0002-7962-0389"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weile Zhang","raw_affiliation_strings":["MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100630996","display_name":"Hui\u2010Ming Wang","orcid":"https://orcid.org/0000-0003-4107-9512"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui-Ming Wang","raw_affiliation_strings":["MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017233409"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.43,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67019096,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.7593010663986206},{"id":"https://openalex.org/keywords/null","display_name":"Null (SQL)","score":0.7173532843589783},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6951296925544739},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6604111194610596},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.6599074602127075},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.6332370638847351},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.6124418377876282},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.602310836315155},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5946409106254578},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.57379150390625},{"id":"https://openalex.org/keywords/secure-multicast","display_name":"Secure multicast","score":0.5385032892227173},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.5306514501571655},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4910390377044678},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.44615769386291504},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.30291682481765747},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24637556076049805},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2151503562927246},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11640092730522156},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10339045524597168},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.06592395901679993},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.06522652506828308}],"concepts":[{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.7593010663986206},{"id":"https://openalex.org/C203763787","wikidata":"https://www.wikidata.org/wiki/Q371029","display_name":"Null (SQL)","level":2,"score":0.7173532843589783},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6951296925544739},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6604111194610596},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.6599074602127075},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.6332370638847351},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.6124418377876282},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.602310836315155},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5946409106254578},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.57379150390625},{"id":"https://openalex.org/C2776147584","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"Secure multicast","level":5,"score":0.5385032892227173},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.5306514501571655},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4910390377044678},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.44615769386291504},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.30291682481765747},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24637556076049805},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2151503562927246},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11640092730522156},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10339045524597168},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.06592395901679993},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.06522652506828308},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C44892269","wikidata":"https://www.wikidata.org/wiki/Q782752","display_name":"Protocol Independent Multicast","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2017.8254497","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2017.8254497","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1577408952","https://openalex.org/W1964339032","https://openalex.org/W1980427653","https://openalex.org/W1981044874","https://openalex.org/W1983143345","https://openalex.org/W1997834106","https://openalex.org/W2007529001","https://openalex.org/W2014145493","https://openalex.org/W2037636326","https://openalex.org/W2041374101","https://openalex.org/W2042599231","https://openalex.org/W2044951885","https://openalex.org/W2052898460","https://openalex.org/W2060416030","https://openalex.org/W2083831155","https://openalex.org/W2092086200","https://openalex.org/W2102654676","https://openalex.org/W2107520399","https://openalex.org/W2112513314","https://openalex.org/W2121204123","https://openalex.org/W2125928210","https://openalex.org/W2138354170","https://openalex.org/W2151851437","https://openalex.org/W2152173384","https://openalex.org/W2156577211","https://openalex.org/W2187253697","https://openalex.org/W2342775801","https://openalex.org/W2518686002","https://openalex.org/W2540385438","https://openalex.org/W2557022797","https://openalex.org/W2749974305","https://openalex.org/W4250589301","https://openalex.org/W4254313632","https://openalex.org/W6682510097"],"related_works":["https://openalex.org/W4391308034","https://openalex.org/W2951619176","https://openalex.org/W2010804147","https://openalex.org/W2392241939","https://openalex.org/W2379693083","https://openalex.org/W2949129242","https://openalex.org/W2145047504","https://openalex.org/W2066459959","https://openalex.org/W2382754013","https://openalex.org/W4285288574"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,33,49,54,58,69,91,99,110,123,135],"artificial":[4],"noise":[5],"(AN)":[6],"aided":[7,137],"secure":[8],"transmission":[9],"design":[10],"in":[11],"a":[12,18,74,95],"multiple-input-":[13],"single-output":[14],"multicast":[15],"channel":[16,29],"where":[17],"common":[19],"message":[20],"is":[21,35,126,132,148],"transmitted":[22],"to":[23,52,86,113],"multiple":[24],"receivers":[25],"and":[26,57,103],"only":[27],"statistical":[28],"state":[30],"information":[31],"of":[32,90,98,118],"eavesdropper":[34],"available.":[36],"In":[37],"this":[38],"scenario,":[39],"there":[40,147],"may":[41,63],"be":[42,65],"no":[43,149],"valid":[44,150],"null":[45,151],"space":[46],"which":[47,84,108],"allows":[48],"AN":[50,61,119,136],"not":[51,64],"affect":[53],"legitimate":[55],"receivers,":[56],"traditional":[59],"null-space":[60],"scheme":[62],"applicable.":[66],"To":[67],"find":[68],"optimal":[70],"design,":[71],"we":[72],"formulate":[73],"secrecy":[75,80],"outage":[76],"probability":[77],"(SOP)":[78],"constrained":[79],"rate":[81],"maximization":[82],"problem":[83,112],"applies":[85],"an":[87,105],"arbitrary":[88],"number":[89],"receivers.":[92],"We":[93],"adopt":[94],"novel":[96],"approximation":[97],"intractable":[100],"SOP":[101],"constraint":[102],"establish":[104],"efficient":[106],"algorithm":[107],"solves":[109],"approximated":[111],"global":[114],"optimality.":[115],"The":[116],"effectiveness":[117],"as":[120,122],"well":[121],"proposed":[124],"solution":[125],"confirmed":[127],"by":[128],"simulation":[129],"results.":[130],"It":[131],"shown":[133],"that":[134],"approach":[138],"performs":[139],"much":[140],"better":[141],"than":[142],"pure":[143],"beamforming":[144],"even":[145],"when":[146],"space.":[152]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
