{"id":"https://openalex.org/W1965760947","doi":"https://doi.org/10.1109/icassp.2010.5496122","title":"Secrecy rate maximization of a miso channelwith multiple multi-antenna eavesdroppers via semidefinite programming","display_name":"Secrecy rate maximization of a miso channelwith multiple multi-antenna eavesdroppers via semidefinite programming","publication_year":2010,"publication_date":"2010-03-01","ids":{"openalex":"https://openalex.org/W1965760947","doi":"https://doi.org/10.1109/icassp.2010.5496122","mag":"1965760947"},"language":"en","primary_location":{"id":"doi:10.1109/icassp.2010.5496122","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp.2010.5496122","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Acoustics, Speech and Signal Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100429879","display_name":"Qiang Li","orcid":"https://orcid.org/0000-0001-5609-3320"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Qiang Li","raw_affiliation_strings":["Department of Electronic Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong","Dept. of Electronic Eng., The Chinese University of Hong Kong, Shatin, N.T., Hong Kong#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong","institution_ids":["https://openalex.org/I177725633"]},{"raw_affiliation_string":"Dept. of Electronic Eng., The Chinese University of Hong Kong, Shatin, N.T., Hong Kong#TAB#","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016986549","display_name":"Wing\u2010Kin Ma","orcid":"https://orcid.org/0000-0001-7314-3537"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wing-Kin Ma","raw_affiliation_strings":["Department of Electronic Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong","Dept. of Electronic Eng., The Chinese University of Hong Kong, Shatin, N.T., Hong Kong#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, The Chinese University of Hong Kong, Shatin, N.T., Hong Kong","institution_ids":["https://openalex.org/I177725633"]},{"raw_affiliation_string":"Dept. of Electronic Eng., The Chinese University of Hong Kong, Shatin, N.T., Hong Kong#TAB#","institution_ids":["https://openalex.org/I177725633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100429879"],"corresponding_institution_ids":["https://openalex.org/I177725633"],"apc_list":null,"apc_paid":null,"fwci":1.1546,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.7946197,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"3042","last_page":"3045"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7778021097183228},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.7190194129943848},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7104711532592773},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.7024931907653809},{"id":"https://openalex.org/keywords/semidefinite-programming","display_name":"Semidefinite programming","score":0.7021991014480591},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.6978102326393127},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6754964590072632},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.6004423499107361},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4449217915534973},{"id":"https://openalex.org/keywords/covariance","display_name":"Covariance","score":0.4332291781902313},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.4178464412689209},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.35342907905578613},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27976280450820923},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20654234290122986},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20389243960380554},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1048244833946228},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08238562941551208}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7778021097183228},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.7190194129943848},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7104711532592773},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.7024931907653809},{"id":"https://openalex.org/C101901036","wikidata":"https://www.wikidata.org/wiki/Q2269096","display_name":"Semidefinite programming","level":2,"score":0.7021991014480591},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.6978102326393127},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6754964590072632},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.6004423499107361},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4449217915534973},{"id":"https://openalex.org/C178650346","wikidata":"https://www.wikidata.org/wiki/Q201984","display_name":"Covariance","level":2,"score":0.4332291781902313},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.4178464412689209},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.35342907905578613},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27976280450820923},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20654234290122986},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20389243960380554},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1048244833946228},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08238562941551208},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp.2010.5496122","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp.2010.5496122","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Conference on Acoustics, Speech and Signal Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1667624797","https://openalex.org/W2043769961","https://openalex.org/W2063773941","https://openalex.org/W2101726439","https://openalex.org/W2102580724","https://openalex.org/W2111398884","https://openalex.org/W2133406100","https://openalex.org/W2138903952","https://openalex.org/W2144007657","https://openalex.org/W2151370439","https://openalex.org/W2170733622","https://openalex.org/W2548940273","https://openalex.org/W2607549630","https://openalex.org/W2620656463","https://openalex.org/W2949672874","https://openalex.org/W6637148486","https://openalex.org/W6673604286"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W2765236478","https://openalex.org/W4360996312","https://openalex.org/W2529506699","https://openalex.org/W2766792752"],"abstract_inverted_index":{"The":[0],"advances":[1],"of":[2,45,86],"multi-antenna":[3,53],"techniques":[4],"has":[5,63,80],"recently":[6],"led":[7],"to":[8,20,122],"renewed":[9],"interest":[10],"in":[11,56,84,113],"physical-layer":[12],"secrecy,":[13],"a":[14,28,38,46,68,81,87,103],"meaningful":[15],"topic":[16],"that":[17,75,94,107,124],"enables":[18],"us":[19],"prevent":[21],"eavesdroppers":[22],"from":[23],"retrieving":[24],"information":[25],"intended":[26],"for":[27,42],"legitimate":[29],"user":[30],"through":[31],"physical":[32],"layer":[33],"designs.":[34],"This":[35,58],"paper":[36],"address":[37],"secrecy-rate":[39,77,111],"maximization":[40,78],"problem":[41,59,79],"the":[43,76,95,114,125],"scenario":[44],"multi-input":[47],"single-output":[48],"channel":[49],"listened":[50],"by":[51,130],"multiple":[52],"eavesdroppers;":[54],"e.g.,":[55],"downlink.":[57],"is":[60,110],"nonconvex":[61],"and":[62,71],"no":[64],"analytical":[65],"solution.":[66],"Through":[67],"careful":[69],"analysis":[70],"reformulation,":[72],"we":[73],"show":[74],"convex":[82],"equivalent":[83],"form":[85],"semidefinite":[88],"program":[89],"(SDP).":[90],"We":[91],"also":[92,120],"prove":[93],"respective":[96],"optimal":[97,112,126],"transmit":[98,108,127],"covariance":[99],"generally":[100],"can":[101,134],"yield":[102,135],"rank-one":[104],"structure,":[105],"implying":[106],"beamforming":[109],"considered":[115],"scenario.":[116],"Simulation":[117],"results":[118],"are":[119],"provided":[121],"illustrate":[123],"design":[128],"solved":[129],"our":[131],"SDP":[132],"approach":[133],"significantly":[136],"improved":[137],"secrecy":[138],"rates":[139],"than":[140],"an":[141],"existing":[142],"closed-form":[143],"design.":[144]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-01-24T23:23:39.755997","created_date":"2025-10-10T00:00:00"}
