{"id":"https://openalex.org/W2742841286","doi":"https://doi.org/10.1109/isit.2017.8006841","title":"New models for interference and broadcast channels with confidential messages","display_name":"New models for interference and broadcast channels with confidential messages","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2742841286","doi":"https://doi.org/10.1109/isit.2017.8006841","mag":"2742841286"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2017.8006841","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027117881","display_name":"Mohamed Nafea","orcid":"https://orcid.org/0000-0003-4631-6767"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohamed Nafea","raw_affiliation_strings":["Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, PA"],"affiliations":[{"raw_affiliation_string":"Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, PA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039328157","display_name":"Aylin Yener","orcid":"https://orcid.org/0000-0003-0820-3390"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aylin Yener","raw_affiliation_strings":["Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, PA"],"affiliations":[{"raw_affiliation_string":"Wireless Communications and Networking Laboratory (WCAN), The Pennsylvania State University, PA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027117881"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":0.8601,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.75734918,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1808","last_page":"1812"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7613565921783447},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7145920395851135},{"id":"https://openalex.org/keywords/code-word","display_name":"Code word","score":0.6758638620376587},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6168959140777588},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5951231122016907},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.5715508460998535},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.5702574849128723},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5278803110122681},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.5087955594062805},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38713762164115906},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.318414568901062},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26953810453414917},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.2662371098995209},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.13831883668899536}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7613565921783447},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7145920395851135},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.6758638620376587},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6168959140777588},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5951231122016907},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.5715508460998535},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.5702574849128723},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5278803110122681},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.5087955594062805},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38713762164115906},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.318414568901062},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26953810453414917},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2662371098995209},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.13831883668899536}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2017.8006841","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2017.8006841","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1639833317","https://openalex.org/W2043769961","https://openalex.org/W2130334496","https://openalex.org/W2145668821","https://openalex.org/W2178986096","https://openalex.org/W2233598973","https://openalex.org/W2515482090","https://openalex.org/W2545362398","https://openalex.org/W2744300671","https://openalex.org/W2914714618","https://openalex.org/W4300840296"],"related_works":["https://openalex.org/W2150391494","https://openalex.org/W4323970276","https://openalex.org/W2951619176","https://openalex.org/W2114007974","https://openalex.org/W2784234829","https://openalex.org/W2150528942","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2340481533","https://openalex.org/W1747611275"],"abstract_inverted_index":{"A":[0],"new":[1,109],"model":[2,111],"for":[3,32,83],"the":[4,33,45,52,63,73,91,94,102,108,122,127,133,143,146,164],"interference":[5],"channel":[6,57],"with":[7,22,58,112,119,132,145,163],"confidential":[8,40,59],"messages":[9,60],"(IC-CM)":[10],"is":[11,20,76,130,138],"introduced,":[12],"where":[13,62],"each":[14],"receiver,":[15,124],"besides":[16],"his":[17,27,159],"noisy":[18,115,148],"observations,":[19,137,161],"provided":[21,131],"a":[23,55,97,151,155],"fixed-length":[24],"subset,":[25],"of":[26,29,36,69,72,93,107,135,158,166],"choosing,":[28],"noiseless":[30,136,160],"observations":[31,116,149],"transmitted":[34,74],"codewords":[35],"both":[37,84,89],"users,":[38],"making":[39],"communication":[41],"more":[42],"challenging":[43],"than":[44],"previous":[46],"such":[47],"model.":[48],"In":[49,88,140],"addition,":[50],"in":[51],"same":[53],"spirit,":[54],"broadcast":[56],"(BC-CM),":[61],"receivers":[64],"noiselessly":[65],"tap":[66],"into":[67],"subsets":[68],"their":[70],"choice":[71],"codeword,":[75],"considered.":[77],"Achievable":[78],"strong":[79],"secrecy":[80],"rate":[81,99,153],"regions":[82],"models":[85],"are":[86,117],"derived.":[87],"models,":[90],"size":[92],"subset":[95,134],"quantifies":[96],"secure":[98],"trade-off":[100],"between":[101],"two":[103],"receivers.":[104],"The":[105],"case":[106],"BC-CM":[110],"one":[113],"receiver's":[114],"degraded":[118,128,147],"respect":[120],"to":[121],"other":[123],"and":[125],"only":[126],"receiver":[129,144],"highlighted.":[139],"this":[141],"case,":[142],"has":[150],"positive":[152],"after":[154],"certain":[156],"threshold":[157],"i.e.,":[162],"aid":[165],"these":[167],"symbols.":[168]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
