{"id":"https://openalex.org/W1558914304","doi":"https://doi.org/10.1109/iccw.2015.7247229","title":"Secure robust resource allocation using full-duplex receivers","display_name":"Secure robust resource allocation using full-duplex receivers","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W1558914304","doi":"https://doi.org/10.1109/iccw.2015.7247229","mag":"1558914304"},"language":"en","primary_location":{"id":"doi:10.1109/iccw.2015.7247229","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccw.2015.7247229","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Communication Workshop (ICCW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100724349","display_name":"Mohammad Reza Abedi","orcid":"https://orcid.org/0000-0003-4114-1339"},"institutions":[{"id":"https://openalex.org/I1516879","display_name":"Tarbiat Modares University","ror":"https://ror.org/03mwgfy56","country_code":"IR","type":"education","lineage":["https://openalex.org/I1516879"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammadreza Abedi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran","Department of Electrical and Computer Engineering , Tarbiat Modares University , Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering , Tarbiat Modares University , Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090238254","display_name":"Nader Mokari","orcid":"https://orcid.org/0000-0001-5364-8888"},"institutions":[{"id":"https://openalex.org/I1516879","display_name":"Tarbiat Modares University","ror":"https://ror.org/03mwgfy56","country_code":"IR","type":"education","lineage":["https://openalex.org/I1516879"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Nader Mokari","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran","Department of Electrical and Computer Engineering , Tarbiat Modares University , Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering , Tarbiat Modares University , Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030979044","display_name":"Hamid Saeedi","orcid":"https://orcid.org/0000-0003-2706-228X"},"institutions":[{"id":"https://openalex.org/I1516879","display_name":"Tarbiat Modares University","ror":"https://ror.org/03mwgfy56","country_code":"IR","type":"education","lineage":["https://openalex.org/I1516879"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Hamid Saeedi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran","Department of Electrical and Computer Engineering , Tarbiat Modares University , Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering , Tarbiat Modares University , Tehran, Iran","institution_ids":["https://openalex.org/I1516879"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035446029","display_name":"Halim Yan\u0131k\u00f6mero\u011flu","orcid":"https://orcid.org/0000-0003-4776-9354"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Halim Yanikomeroglu","raw_affiliation_strings":["Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada","Department of Systems and Computer Engineering, Carleton University Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"Department of Systems and Computer Engineering, Carleton University Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100724349"],"corresponding_institution_ids":["https://openalex.org/I1516879"],"apc_list":null,"apc_paid":null,"fwci":1.0035,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78683933,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"497","last_page":"502"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9616000056266785,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9484000205993652,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8866807222366333},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.740043580532074},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7038660049438477},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5376831889152527},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.5350410342216492},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5316617488861084},{"id":"https://openalex.org/keywords/transmitter-power-output","display_name":"Transmitter power output","score":0.4842831492424011},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.4558109939098358},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.43439218401908875},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.430219829082489},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2669779360294342},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21424445509910583},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1710057556629181},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.1709955930709839}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8866807222366333},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.740043580532074},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7038660049438477},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5376831889152527},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.5350410342216492},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5316617488861084},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.4842831492424011},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.4558109939098358},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.43439218401908875},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.430219829082489},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2669779360294342},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21424445509910583},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1710057556629181},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.1709955930709839},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iccw.2015.7247229","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccw.2015.7247229","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Communication Workshop (ICCW)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.701.3076","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.701.3076","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.sce.carleton.ca/faculty/yanikomeroglu/Pub/ICC2015workshops-manmhshy.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1967219667","https://openalex.org/W1972785130","https://openalex.org/W2007529001","https://openalex.org/W2009204314","https://openalex.org/W2014631750","https://openalex.org/W2025488327","https://openalex.org/W2043769961","https://openalex.org/W2060416030","https://openalex.org/W2083507154","https://openalex.org/W2104478100","https://openalex.org/W2119612043","https://openalex.org/W2120073444","https://openalex.org/W2136471217","https://openalex.org/W2136876942","https://openalex.org/W2149194340","https://openalex.org/W2156759922","https://openalex.org/W2162146405","https://openalex.org/W2165589418","https://openalex.org/W2171006634","https://openalex.org/W2296319761","https://openalex.org/W2557746379","https://openalex.org/W2963014570","https://openalex.org/W4250589301"],"related_works":["https://openalex.org/W2765236478","https://openalex.org/W2972424885","https://openalex.org/W2104478100","https://openalex.org/W2107866095","https://openalex.org/W4360996312","https://openalex.org/W2529506699","https://openalex.org/W1680452241","https://openalex.org/W2051457655","https://openalex.org/W2097805107","https://openalex.org/W2561179371"],"abstract_inverted_index":{"This":[0,69],"paper":[1],"studies":[2],"a":[3,23,33,78,82,148],"robust":[4],"resource":[5],"allocation":[6,155],"framework":[7],"to":[8,29,46,57,72,87,136,161],"enhance":[9],"physical":[10],"layer":[11],"security":[12],"where":[13,32],"it":[14],"is":[15,20,37,70,125,156],"assumed":[16],"that":[17,196],"the":[18,48,53,59,64,89,93,96,104,110,116,138,142,163,170,177,180,186,201,206,211],"system":[19,79,208],"equipped":[21,80],"with":[22,81],"full-duplex":[24],"(FD)":[25],"receiver":[26,36,91,98],"in":[27,145],"contrast":[28],"conventional":[30,212],"frameworks":[31],"half-duplex":[34],"(HD)":[35],"at":[38],"hand.":[39],"Conventionally,":[40],"relays":[41,123],"are":[42,191],"used":[43],"as":[44,56,73,92],"jammer":[45],"reduce":[47],"signal":[49],"quality":[50],"received":[51],"by":[52],"eavesdroppers":[54],"so":[55],"increase":[58],"secrecy":[60,164],"transmission":[61],"rate":[62],"between":[63,179],"legitimate":[65,149],"transmitter":[66,150],"and":[67,182,204],"receiver.":[68],"referred":[71],"cooperative":[74],"jamming":[75,101,122,202],"(CJ).":[76],"In":[77],"FD":[83,90,97],"receiver,":[84],"we":[85],"propose":[86],"use":[88],"jammer,":[94],"i.e.,":[95,121],"simultaneously":[99],"transmits":[100],"signals":[102],"toward":[103],"eavesdropper":[105,181],"while":[106],"receiving":[107],"data":[108],"from":[109,127],"transmitter.":[111],"The":[112],"proposed":[113,139,207],"scheme":[114,140,144],"eliminates":[115],"need":[117],"for":[118,158,197],"external":[119],"helpers,":[120],"which":[124],"welcome":[126],"practical":[128],"point":[129],"of":[130,172,176,200],"view.":[131],"We":[132],"consider":[133],"different":[134],"scenarios":[135],"compare":[137],"against":[141],"CJ":[143,213],"which,":[146],"under":[147],"power":[151,154],"constraint,":[152],"optimal":[153],"obtained":[157],"each":[159],"scenario":[160],"maximize":[162],"rate.":[165],"To":[166],"take":[167],"into":[168],"account":[169],"impact":[171],"imperfect":[173],"state":[174],"information":[175],"channels":[178],"other":[183],"nodes":[184],"on":[185],"network,":[187],"worst-case":[188],"optimization":[189],"approaches":[190],"considered.":[192],"Simulation":[193],"results":[194],"demonstrate":[195],"certain":[198],"positions":[199],"relay":[203],"eavesdropper,":[205],"can":[209],"outperform":[210],"schemes.":[214]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
