{"id":"https://openalex.org/W2917110584","doi":"https://doi.org/10.1109/glocom.2018.8647585","title":"Security-Enhanced User Pairing for MISO-NOMA Downlink Transmission","display_name":"Security-Enhanced User Pairing for MISO-NOMA Downlink Transmission","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2917110584","doi":"https://doi.org/10.1109/glocom.2018.8647585","mag":"2917110584"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2018.8647585","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647585","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045607162","display_name":"Tantan Zhao","orcid":"https://orcid.org/0000-0001-6623-8626"},"institutions":[{"id":"https://openalex.org/I2801345734","display_name":"China Academy of Engineering Physics","ror":"https://ror.org/039vqpp67","country_code":"CN","type":"facility","lineage":["https://openalex.org/I2801345734"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tantan Zhao","raw_affiliation_strings":["Institute of Computer Application, China Academy of Engineering Physics, Mianyang, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Application, China Academy of Engineering Physics, Mianyang, China","institution_ids":["https://openalex.org/I2801345734"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100318268","display_name":"Guobing Li","orcid":"https://orcid.org/0000-0002-7507-6961"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guobing Li","raw_affiliation_strings":["School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090099779","display_name":"Guomei Zhang","orcid":"https://orcid.org/0000-0002-8240-7802"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guomei Zhang","raw_affiliation_strings":["School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100749933","display_name":"Chunxia Zhang","orcid":"https://orcid.org/0000-0001-9639-4507"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chun-Xia Zhang","raw_affiliation_strings":["School of Mathematics and Statistics, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5045607162"],"corresponding_institution_ids":["https://openalex.org/I2801345734"],"apc_list":null,"apc_paid":null,"fwci":0.2575,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.59891394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.870174765586853},{"id":"https://openalex.org/keywords/noma","display_name":"Noma","score":0.8392461538314819},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.7332192659378052},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.7230280041694641},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7055730819702148},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.6273549795150757},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5993200540542603},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5827224850654602},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45533791184425354},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.42700350284576416},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21856823563575745},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21848773956298828},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1523689329624176}],"concepts":[{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.870174765586853},{"id":"https://openalex.org/C2775918612","wikidata":"https://www.wikidata.org/wiki/Q994794","display_name":"Noma","level":3,"score":0.8392461538314819},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.7332192659378052},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.7230280041694641},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7055730819702148},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.6273549795150757},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5993200540542603},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5827224850654602},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45533791184425354},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.42700350284576416},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21856823563575745},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21848773956298828},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1523689329624176},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2018.8647585","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647585","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1568096262","https://openalex.org/W1690504809","https://openalex.org/W1901462474","https://openalex.org/W1922937245","https://openalex.org/W1970334960","https://openalex.org/W1996215314","https://openalex.org/W2040317577","https://openalex.org/W2043769961","https://openalex.org/W2065365556","https://openalex.org/W2085486577","https://openalex.org/W2086559523","https://openalex.org/W2134968843","https://openalex.org/W2148622067","https://openalex.org/W2171006634","https://openalex.org/W2219490794","https://openalex.org/W2277419020","https://openalex.org/W2302349451","https://openalex.org/W2332346216","https://openalex.org/W2506399502","https://openalex.org/W2565158077","https://openalex.org/W2582744858","https://openalex.org/W2801425721","https://openalex.org/W2963791781","https://openalex.org/W3099378150","https://openalex.org/W3103423272"],"related_works":["https://openalex.org/W3030525848","https://openalex.org/W4385197910","https://openalex.org/W2340639785","https://openalex.org/W3010814398","https://openalex.org/W4385197899","https://openalex.org/W3005957545","https://openalex.org/W2076432172","https://openalex.org/W4309235375","https://openalex.org/W2887349183","https://openalex.org/W2795815818"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"the":[3,30,62,69,82,114,122,128,132],"transmission":[4,16],"security":[5,34,58,64],"for":[6,19,53,98],"multiuser":[7],"multi-input":[8],"single-output":[9],"(MU-MISO)-":[10],"Non-orthogonal":[11],"multiple":[12],"access":[13],"(NOMA)":[14],"downlink":[15,106],"is":[17,101],"studied":[18],"untrusted":[20],"users.":[21],"We":[22,46],"propose":[23],"a":[24,49,87,93],"security-enhanced":[25],"user":[26,89],"pairing":[27,90],"scheme":[28,117,135],"under":[29],"constraints":[31,67],"of":[32,68,131],"weak":[33,43,57,63],"to":[35,56],"achieve":[36],"high":[37],"spectrum":[38],"efficiency":[39],"as":[40,42],"well":[41],"system":[44],"secrecy.":[45],"first":[47],"formulate":[48],"sum-rate":[50,95],"maximization":[51,96],"problem":[52,85,91,97],"NOMA":[54,116,134],"subject":[55],"constraints,":[59],"and":[60,92,108,121,126],"reformulate":[61],"requirement":[65],"into":[66,86],"average":[70],"bit":[71],"error":[72],"rate":[73],"(BER)":[74],"at":[75],"any":[76],"undesired":[77],"user.":[78],"Then":[79],"we":[80],"decompose":[81],"original":[83],"optimization":[84],"security-guaranteed":[88],"conventional":[94,123],"NOMA,":[99],"which":[100],"eventually":[102],"solved":[103],"by":[104],"jointly":[105],"beamforming":[107],"power":[109],"allocation.":[110],"Simulation":[111],"results":[112],"compare":[113],"proposed":[115,133],"with":[118],"zero-forcing":[119],"(ZF)":[120],"MU-MISO":[124],"beamforming,":[125],"reveal":[127],"performance":[129],"gain":[130],"in":[136],"secrecy":[137],"sum-rate.":[138]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
