{"id":"https://openalex.org/W2394815362","doi":"https://doi.org/10.1109/icassp.2016.7472034","title":"Combining dirty-paper coding and artificial noise for secrecy","display_name":"Combining dirty-paper coding and artificial noise for secrecy","publication_year":2016,"publication_date":"2016-03-01","ids":{"openalex":"https://openalex.org/W2394815362","doi":"https://doi.org/10.1109/icassp.2016.7472034","mag":"2394815362"},"language":"en","primary_location":{"id":"doi:10.1109/icassp.2016.7472034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp.2016.7472034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100408159","display_name":"Bo Wang","orcid":"https://orcid.org/0000-0002-9496-7161"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bo Wang","raw_affiliation_strings":["School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076885168","display_name":"Pengcheng Mu","orcid":"https://orcid.org/0000-0001-9208-9900"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengcheng Mu","raw_affiliation_strings":["School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100407081","display_name":"Chao Wang","orcid":"https://orcid.org/0000-0003-0187-6453"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Wang","raw_affiliation_strings":["School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026374722","display_name":"Weile Zhang","orcid":"https://orcid.org/0000-0002-7962-0389"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weile Zhang","raw_affiliation_strings":["School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100630996","display_name":"Hui\u2010Ming Wang","orcid":"https://orcid.org/0000-0003-4107-9512"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui-Ming Wang","raw_affiliation_strings":["School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electron. & Inform. Eng, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101582547","display_name":"Bobin Yao","orcid":"https://orcid.org/0000-0002-3905-3973"},"institutions":[{"id":"https://openalex.org/I25355098","display_name":"Chang'an University","ror":"https://ror.org/05mxya461","country_code":"CN","type":"education","lineage":["https://openalex.org/I25355098"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bobin Yao","raw_affiliation_strings":["School of Electron. & Control Eng, Chang'an University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electron. & Control Eng, Chang'an University, Xi'an, China","institution_ids":["https://openalex.org/I25355098"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100408159"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.1838,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5566644,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"46","issue":null,"first_page":"2034","last_page":"2038"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8796727657318115},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.8498014211654663},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8064780831336975},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.6020791530609131},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5930454730987549},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5345168709754944},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.5324586033821106},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.5220180153846741},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.447146475315094},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4236636459827423},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2701781392097473},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24596747756004333},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.18979400396347046},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.1865113079547882},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1071062982082367}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8796727657318115},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.8498014211654663},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8064780831336975},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.6020791530609131},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5930454730987549},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5345168709754944},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.5324586033821106},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.5220180153846741},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.447146475315094},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4236636459827423},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2701781392097473},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24596747756004333},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.18979400396347046},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.1865113079547882},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1071062982082367},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icassp.2016.7472034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icassp.2016.7472034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1976109068","https://openalex.org/W1980427653","https://openalex.org/W2007529001","https://openalex.org/W2037636326","https://openalex.org/W2060416030","https://openalex.org/W2088892532","https://openalex.org/W2102654676","https://openalex.org/W2103150712","https://openalex.org/W2129457795","https://openalex.org/W2141797073","https://openalex.org/W2148672861","https://openalex.org/W2151795416","https://openalex.org/W4250589301","https://openalex.org/W4292058084"],"related_works":["https://openalex.org/W2951619176","https://openalex.org/W2994678687","https://openalex.org/W2478698443","https://openalex.org/W2741591884","https://openalex.org/W2290997318","https://openalex.org/W2340550229","https://openalex.org/W2790990878","https://openalex.org/W4256489728","https://openalex.org/W1747611275","https://openalex.org/W3159852908"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,16,36,40,52,73,82,105,113,118,129,132,136,147],"dirty-paper":[4],"coding":[5],"(DPC)":[6],"based":[7],"secure":[8,79,92],"transmission":[9,80,93],"in":[10,61,125],"a":[11,90,140],"multiuser":[12,49],"broadcast":[13],"channel.":[14],"Since":[15],"encoding":[17],"order":[18],"of":[19,39,48,146],"DPC":[20,34,98],"determines":[21],"which":[22,95],"information-bearing":[23,53],"signals":[24,54],"must":[25],"be":[26,56],"treated":[27],"as":[28,43,45],"noise":[29,101],"by":[30],"potential":[31,137],"eavesdroppers,":[32],"adopting":[33],"enables":[35],"accurate":[37],"characterization":[38],"intrinsic":[41],"secrecy":[42,46,60,106,114,141],"well":[44],"outage":[47,115],"broadcasting.":[50],"Furthermore,":[51],"can":[55],"designed":[57],"to":[58,63,127,138,144],"provide":[59],"addition":[62,126],"supporting":[64,128],"normal":[65,86,119,130],"(unclassified)":[66],"transmission.":[67],"To":[68],"show":[69],"this,":[70],"we":[71,122],"consider":[72],"scenario":[74],"where":[75],"one":[76],"user":[77],"requests":[78],"and":[81,88,99,117],"other":[83],"users":[84],"request":[85],"transmission,":[87,131],"propose":[89],"hybrid":[91],"scheme":[94,134],"combines":[96],"zero-forcing":[97],"artificial":[100],"(AN).":[102],"By":[103],"solving":[104],"rate":[107,142],"maximization":[108],"problem":[109],"under":[110],"constraints":[111],"on":[112],"probability":[116],"communication":[120],"rates,":[121],"find":[123],"that":[124,145],"proposed":[133],"has":[135],"achieve":[139],"close":[143],"traditional":[148],"AN-based":[149],"beamforming.":[150]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
