{"id":"https://openalex.org/W2026196776","doi":"https://doi.org/10.1109/glocomw.2014.7063612","title":"On secrecy throughput optimization of a DF relay network subjected to slow fading","display_name":"On secrecy throughput optimization of a DF relay network subjected to slow fading","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W2026196776","doi":"https://doi.org/10.1109/glocomw.2014.7063612","mag":"2026196776"},"language":"en","primary_location":{"id":"doi:10.1109/glocomw.2014.7063612","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2014.7063612","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009947614","display_name":"Tong-Xing Zheng","orcid":"https://orcid.org/0000-0002-8730-5063"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tong-Xing Zheng","raw_affiliation_strings":["School of Electronic and Information Engineering, Education Key Lab for Intelligent Networks and Network Security, Xi'an, Shaanxi, P.R. China","School of Electronic and Information Engineering, Xi'an Jiaotong University, Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University Xi'an, 710049, Shaanxi, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Education Key Lab for Intelligent Networks and Network Security, Xi'an, Shaanxi, P.R. China","institution_ids":[]},{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University Xi'an, 710049, Shaanxi, P.R. China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100630996","display_name":"Hui\u2010Ming Wang","orcid":"https://orcid.org/0000-0003-4107-9512"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui-Ming Wang","raw_affiliation_strings":["School of Electronic and Information Engineering, Education Key Lab for Intelligent Networks and Network Security, Xi'an, Shaanxi, P.R. China","School of Electronic and Information Engineering, Xi'an Jiaotong University, Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University Xi'an, 710049, Shaanxi, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Education Key Lab for Intelligent Networks and Network Security, Xi'an, Shaanxi, P.R. China","institution_ids":[]},{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Ministry of Education Key Lab for Intelligent Networks and Network Security, Xi'an Jiaotong University Xi'an, 710049, Shaanxi, P.R. China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009947614"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.628,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72898434,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1296","last_page":"1301"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.8476482033729553},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.825433611869812},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7010747194290161},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.6565105319023132},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.6515555381774902},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.5062167048454285},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.47702428698539734},{"id":"https://openalex.org/keywords/signal-to-noise-ratio","display_name":"Signal-to-noise ratio (imaging)","score":0.46959295868873596},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.45512861013412476},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4497806131839752},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4454463720321655},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4110238552093506},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2998022139072418},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18463367223739624},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.15187111496925354},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15023905038833618},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.05264022946357727}],"concepts":[{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.8476482033729553},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.825433611869812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7010747194290161},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.6565105319023132},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.6515555381774902},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.5062167048454285},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.47702428698539734},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.46959295868873596},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.45512861013412476},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4497806131839752},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4454463720321655},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4110238552093506},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2998022139072418},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18463367223739624},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.15187111496925354},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15023905038833618},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.05264022946357727},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocomw.2014.7063612","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2014.7063612","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1987034598","https://openalex.org/W2043769961","https://openalex.org/W2065313044","https://openalex.org/W2075147842","https://openalex.org/W2086006789","https://openalex.org/W2096151870","https://openalex.org/W2097555694","https://openalex.org/W2104332573","https://openalex.org/W2112513314","https://openalex.org/W2113706820","https://openalex.org/W2124071994","https://openalex.org/W2164310757","https://openalex.org/W2171006634","https://openalex.org/W2963014570"],"related_works":["https://openalex.org/W1931943713","https://openalex.org/W301676527","https://openalex.org/W2103028776","https://openalex.org/W1757854673","https://openalex.org/W3140554627","https://openalex.org/W2507345605","https://openalex.org/W4289865786","https://openalex.org/W2110670012","https://openalex.org/W2051005918","https://openalex.org/W2172055400"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,7,30,37,42,47,52,70,74,80,86],"parameter":[4],"design":[5],"for":[6],"secrecy":[8,13],"throughput":[9,54],"optimization":[10,43],"under":[11],"a":[12,17],"outage":[14],"constraint":[15],"in":[16],"DF":[18],"relay":[19],"network":[20],"subjected":[21],"to":[22,85],"fading.":[23],"The":[24],"parameters":[25],"are":[26,83],"designed":[27],"based":[28],"on":[29],"statistical":[31],"channel":[32],"state":[33],"information":[34],"(SCSI)":[35],"of":[36,73],"legitimate":[38],"channel.":[39],"We":[40,59],"formulate":[41],"issue":[44],"and":[45,68,91],"introduce":[46],"optimal":[48,87],"scheme,":[49],"with":[50,65],"which":[51],"maximum":[53],"can":[55],"be":[56],"numerically":[57],"obtained.":[58],"further":[60],"propose":[61],"two":[62],"suboptimal":[63,81],"schemes":[64],"lower":[66],"complexity":[67],"derive":[69],"closed-form":[71],"expressions":[72],"throughput.":[75],"Numerical":[76],"results":[77],"show":[78],"that,":[79],"solutions":[82],"approximate":[84],"one":[88],"at":[89],"high":[90],"low":[92],"SNR":[93],"regimes,":[94],"respectively.":[95]},"counts_by_year":[{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
