{"id":"https://openalex.org/W3045528987","doi":"https://doi.org/10.1109/icc40277.2020.9148618","title":"Single-Group Multicast Secure Beamforming via Learning the Eavesdropper\u2019s Channel Correlation","display_name":"Single-Group Multicast Secure Beamforming via Learning the Eavesdropper\u2019s Channel Correlation","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3045528987","doi":"https://doi.org/10.1109/icc40277.2020.9148618","mag":"3045528987"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9148618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041062399","display_name":"Simeng Fan","orcid":"https://orcid.org/0000-0002-0161-1829"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Simeng Fan","raw_affiliation_strings":["Department of Information and Communications Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, Shannxi, P. R. China","Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, Shannxi, P. R. China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communications Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, Shannxi, P. R. China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, Shannxi, P. R. China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033137714","display_name":"Jing Xu","orcid":"https://orcid.org/0000-0003-0072-8520"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Xu","raw_affiliation_strings":["Department of Information and Communications Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, Shannxi, P. R. China","Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, Shannxi, P. R. China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communications Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, Shannxi, P. R. China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Department of Information and Communications Engineering, Xi'an Jiaotong University, Xi'an, Shannxi, P. R. China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041062399"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.1027,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.41850446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.8008135557174683},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6271779537200928},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.6140787601470947},{"id":"https://openalex.org/keywords/secure-multicast","display_name":"Secure multicast","score":0.5551243424415588},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.5445383787155151},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.5002813339233398},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4951261579990387},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.4878104031085968},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.47697481513023376},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4583977162837982},{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.43634289503097534},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.41369619965553284},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3679930567741394},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35815924406051636},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.27403348684310913},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.22329238057136536},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20840367674827576},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16486191749572754},{"id":"https://openalex.org/keywords/source-specific-multicast","display_name":"Source-specific multicast","score":0.15872979164123535},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.06990516185760498}],"concepts":[{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.8008135557174683},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6271779537200928},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.6140787601470947},{"id":"https://openalex.org/C2776147584","wikidata":"https://www.wikidata.org/wiki/Q2711392","display_name":"Secure multicast","level":5,"score":0.5551243424415588},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.5445383787155151},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.5002813339233398},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4951261579990387},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.4878104031085968},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.47697481513023376},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4583977162837982},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.43634289503097534},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.41369619965553284},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3679930567741394},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35815924406051636},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27403348684310913},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.22329238057136536},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20840367674827576},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16486191749572754},{"id":"https://openalex.org/C18787934","wikidata":"https://www.wikidata.org/wiki/Q7565105","display_name":"Source-specific multicast","level":3,"score":0.15872979164123535},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.06990516185760498},{"id":"https://openalex.org/C112037812","wikidata":"https://www.wikidata.org/wiki/Q2107523","display_name":"Pragmatic General Multicast","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9148618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9148618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1568096262","https://openalex.org/W1964339032","https://openalex.org/W1981044874","https://openalex.org/W2025488327","https://openalex.org/W2039538800","https://openalex.org/W2052898460","https://openalex.org/W2055701814","https://openalex.org/W2084890524","https://openalex.org/W2087674093","https://openalex.org/W2110251229","https://openalex.org/W2115543075","https://openalex.org/W2119161934","https://openalex.org/W2124360200","https://openalex.org/W2128022754","https://openalex.org/W2130325234","https://openalex.org/W2243044614","https://openalex.org/W2478503558","https://openalex.org/W2507535994","https://openalex.org/W2753664374","https://openalex.org/W2946223615","https://openalex.org/W6679483253"],"related_works":["https://openalex.org/W1993671760","https://openalex.org/W2376754011","https://openalex.org/W3026778509","https://openalex.org/W4391308034","https://openalex.org/W4287776800","https://openalex.org/W2951619176","https://openalex.org/W2462883630","https://openalex.org/W3188430173","https://openalex.org/W3116845106","https://openalex.org/W2183269049"],"abstract_inverted_index":{"In":[0,159],"this":[1,93],"study,":[2],"two":[3],"cognitive":[4,86,138,194,230],"single-group":[5],"multicast":[6,38,75,248],"secure":[7],"beamforming":[8],"(SGMC-S-BF)":[9],"schemes":[10,196],"are":[11,141,197],"proposed":[12,82,190],"for":[13,74],"a":[14,24,41,144],"scenario":[15],"where":[16],"there":[17],"exist":[18],"one":[19],"eavesdropper":[20],"who":[21],"is":[22,61,156,171],"actually":[23],"regular":[25],"user":[26],"of":[27,63,67,92,146],"the":[28,45,55,64,69,81,98,107,110,119,123,133,152,162,167,177,182,189,209,214,224,227],"legitimate":[29,70],"communication":[30],"system,":[31],"but":[32,59,199],"it":[33,60],"attempts":[34],"to":[35,243],"access":[36],"unauthorized":[37],"service.":[39],"Under":[40],"realistic":[42],"assumption":[43],"that":[44,97,186],"transmitter":[46,108],"has":[47],"no":[48],"instantaneous":[49,65,169],"channel":[50,100,126,154],"state":[51],"information":[52],"(CSI)":[53],"regarding":[54],"eavesdropping":[56],"link":[57],"(ECSI),":[58],"aware":[62],"CSI":[66],"all":[68],"users,":[71],"we":[72],"seek":[73],"secrecy":[76,204,236],"rate":[77,205,237],"maximization":[78],"(SRM)":[79],"through":[80,143],"rank-one":[83,135,191,240],"and":[84,136,192],"rank-two":[85,137,193,229],"SGMC-S-BF":[87,139,180,195,218],"schemes.":[88,219],"The":[89],"main":[90],"contribution":[91],"work":[94],"lies":[95],"in":[96,165,223,247],"eavesdropper's":[99,125,153],"correlation":[101,127,155],"matrix":[102],"can":[103,128],"be":[104,129],"learned":[105],"by":[106,174,213],"from":[109],"accumulated":[111],"binary":[112],"received":[113],"signal-to-noise-ratio":[114],"(SNR)":[115],"feedback.":[116],"Based":[117],"on":[118],"iterative":[120],"learning":[121],"machinery,":[122],"estimated":[124],"constantly":[130],"updated.":[131,158],"Correspondingly,":[132],"optimal":[134,210],"vectors":[140],"determined":[142],"series":[145],"solvable":[147],"convex":[148],"problems":[149],"every":[150],"time":[151],"being":[157],"comparison":[160],"with":[161],"ideal":[163,215],"case":[164],"which":[166],"perfect":[168],"ECSI":[170],"also":[172,200],"known":[173],"Alice,":[175],"i.e.,":[176],"genie":[178,216],"aided":[179,217],"schemes,":[181],"numerical":[183],"results":[184],"reveal":[185],"not":[187],"only":[188],"feasible,":[198],"as":[201,221],"expected":[202],"their":[203],"performances":[206],"asymptotically":[207],"approach":[208],"performance":[211],"achieved":[212],"Moreover,":[220],"illustrated":[222],"simulation":[225],"results,":[226],"preferred":[228],"SGMC-SBF":[231],"design":[232,245],"could":[233],"achieve":[234],"higher":[235],"than":[238],"its":[239],"counterpart":[241],"due":[242],"more":[244],"freedom":[246],"scenario.":[249]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
