{"id":"https://openalex.org/W4360605174","doi":"https://doi.org/10.1109/icaiic57133.2023.10066997","title":"Exploiting Secure Multihop Transmission in Underlying Cognitive Radio Networks: Analysis and Deep Learning Approaches","display_name":"Exploiting Secure Multihop Transmission in Underlying Cognitive Radio Networks: Analysis and Deep Learning Approaches","publication_year":2023,"publication_date":"2023-02-20","ids":{"openalex":"https://openalex.org/W4360605174","doi":"https://doi.org/10.1109/icaiic57133.2023.10066997"},"language":"en","primary_location":{"id":"doi:10.1109/icaiic57133.2023.10066997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic57133.2023.10066997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034309196","display_name":"Kyusung Shim","orcid":"https://orcid.org/0000-0003-4851-0811"},"institutions":[{"id":"https://openalex.org/I119060216","display_name":"Hankyong National University","ror":"https://ror.org/0031nsg68","country_code":"KR","type":"education","lineage":["https://openalex.org/I119060216"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Kyusung Shim","raw_affiliation_strings":["School of Computer Engineering &#x0026; Applied Mathematics, Hankyong National University,Republic of Korea"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering &#x0026; Applied Mathematics, Hankyong National University,Republic of Korea","institution_ids":["https://openalex.org/I119060216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037079266","display_name":"Beongku An","orcid":"https://orcid.org/0000-0002-0587-3754"},"institutions":[{"id":"https://openalex.org/I94588446","display_name":"Hongik University","ror":"https://ror.org/00egdv862","country_code":"KR","type":"education","lineage":["https://openalex.org/I94588446"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Beongku An","raw_affiliation_strings":["Hongik University,Dept. of Software and Communications Engineering,Republic of Korea","Dept. of Software and Communications Engineering, Hongik University, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Hongik University,Dept. of Software and Communications Engineering,Republic of Korea","institution_ids":["https://openalex.org/I94588446"]},{"raw_affiliation_string":"Dept. of Software and Communications Engineering, Hongik University, Republic of Korea","institution_ids":["https://openalex.org/I94588446"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034309196"],"corresponding_institution_ids":["https://openalex.org/I119060216"],"apc_list":null,"apc_paid":null,"fwci":0.2678,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.50969816,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"281","last_page":"285"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9858440160751343},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7670447826385498},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.751886248588562},{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.7272477149963379},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6749331951141357},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5588499307632446},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.5402244329452515},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.49973559379577637},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.455392062664032},{"id":"https://openalex.org/keywords/expression","display_name":"Expression (computer science)","score":0.4189002513885498},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.41712307929992676},{"id":"https://openalex.org/keywords/monte-carlo-method","display_name":"Monte Carlo method","score":0.4145847260951996},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3896826207637787},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31853216886520386},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1913732886314392},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.1694503128528595},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11638331413269043},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.10398522019386292},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10262027382850647},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.07169514894485474}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9858440160751343},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7670447826385498},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.751886248588562},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.7272477149963379},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6749331951141357},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5588499307632446},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.5402244329452515},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.49973559379577637},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.455392062664032},{"id":"https://openalex.org/C90559484","wikidata":"https://www.wikidata.org/wiki/Q778379","display_name":"Expression (computer science)","level":2,"score":0.4189002513885498},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.41712307929992676},{"id":"https://openalex.org/C19499675","wikidata":"https://www.wikidata.org/wiki/Q232207","display_name":"Monte Carlo method","level":2,"score":0.4145847260951996},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3896826207637787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31853216886520386},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1913732886314392},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.1694503128528595},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11638331413269043},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.10398522019386292},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10262027382850647},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.07169514894485474},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaiic57133.2023.10066997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic57133.2023.10066997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2016228265","https://openalex.org/W2523282365","https://openalex.org/W2779499476","https://openalex.org/W2964026136","https://openalex.org/W2974780170","https://openalex.org/W2994954210","https://openalex.org/W2997415133","https://openalex.org/W2997922851","https://openalex.org/W3045086480","https://openalex.org/W3161785019","https://openalex.org/W4230959423","https://openalex.org/W4290711223"],"related_works":["https://openalex.org/W1993671760","https://openalex.org/W2376754011","https://openalex.org/W3026778509","https://openalex.org/W2462883630","https://openalex.org/W2951619176","https://openalex.org/W2786811319","https://openalex.org/W2949251982","https://openalex.org/W4285103104","https://openalex.org/W2972651196","https://openalex.org/W3031308674"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,6,23,34,50,58,82,85,96,99,103,108],"impact":[4],"of":[5,95,101,105],"eavesdropping":[7,45],"attacks":[8],"on":[9],"secure":[10],"multihop":[11],"transmission":[12],"in":[13],"cognitive":[14],"radio":[15],"networks.":[16],"When":[17],"secondary":[18],"users":[19],"transmit":[20],"confidential":[21],"information,":[22],"eavesdroppers":[24],"overhear":[25],"this":[26],"information":[27,75],"collaboratively":[28],"and":[29,62,88,107],"independently,":[30],"respectively.":[31,115],"We":[32],"derive":[33],"exact":[35],"closed-form":[36,86],"expression":[37,87],"for":[38],"secrecy":[39,109],"outage":[40],"probability":[41],"(SOP)":[42],"with":[43],"different":[44],"attacks.":[46],"Additionally,":[47],"we":[48],"propose":[49],"deep":[51],"neural":[52],"network":[53],"(DNN)-based":[54],"framework":[55,90],"to":[56,77],"capture":[57],"relation":[59],"between":[60],"input":[61],"output.":[63],"The":[64,93],"numerical":[65],"results":[66],"show":[67],"that":[68],"a":[69,78],"colluding":[70],"attack":[71],"can":[72],"wiretap":[73],"more":[74],"compared":[76],"non-colluding":[79],"attack.":[80],"From":[81],"Monte-Carlo":[83],"simulation,":[84],"DNN-based":[89],"are":[91,113],"verified.":[92],"effects":[94],"interference":[97],"threshold,":[98],"number":[100,104],"hops,":[102],"eavesdroppers,":[106],"target":[110],"data":[111],"rate":[112],"investigated,":[114]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
