{"id":"https://openalex.org/W4289713099","doi":"https://doi.org/10.1109/isit50566.2022.9834748","title":"Secure Joint Communication and Sensing","display_name":"Secure Joint Communication and Sensing","publication_year":2022,"publication_date":"2022-06-26","ids":{"openalex":"https://openalex.org/W4289713099","doi":"https://doi.org/10.1109/isit50566.2022.9834748"},"language":"en","primary_location":{"id":"doi:10.1109/isit50566.2022.9834748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834748","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016620064","display_name":"Onur G\u00fcnl\u00fc","orcid":"https://orcid.org/0000-0002-0313-7788"},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Onur G\u00fcnl\u00fc","raw_affiliation_strings":["University of Siegen,Chair of Communications Engineering and Security","Chair of Communications Engineering and Security, University of Siegen"],"affiliations":[{"raw_affiliation_string":"University of Siegen,Chair of Communications Engineering and Security","institution_ids":["https://openalex.org/I206895457"]},{"raw_affiliation_string":"Chair of Communications Engineering and Security, University of Siegen","institution_ids":["https://openalex.org/I206895457"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055689993","display_name":"Matthieu R. Bloch","orcid":"https://orcid.org/0000-0001-9315-9050"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthieu Bloch","raw_affiliation_strings":["Georgia Institute of Technology,School of Electrical and Computer Engineering","School of Electrical and Computer Engineering, Georgia Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology,School of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038203207","display_name":"Rafael F. Schaefer","orcid":"https://orcid.org/0000-0002-1702-9075"},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Rafael F. Schaefer","raw_affiliation_strings":["University of Siegen,Chair of Communications Engineering and Security","Chair of Communications Engineering and Security, University of Siegen"],"affiliations":[{"raw_affiliation_string":"University of Siegen,Chair of Communications Engineering and Security","institution_ids":["https://openalex.org/I206895457"]},{"raw_affiliation_string":"Chair of Communications Engineering and Security, University of Siegen","institution_ids":["https://openalex.org/I206895457"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039328157","display_name":"Aylin Yener","orcid":"https://orcid.org/0000-0003-0820-3390"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aylin Yener","raw_affiliation_strings":["The Ohio State University,Department of Electrical and Computer Engineering","Department of Electrical and Computer Engineering, The Ohio State University"],"affiliations":[{"raw_affiliation_string":"The Ohio State University,Department of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I52357470"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The Ohio State University","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016620064"],"corresponding_institution_ids":["https://openalex.org/I206895457"],"apc_list":null,"apc_paid":null,"fwci":5.4671,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.97656352,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"844","last_page":"849"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7203086614608765},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.7059374451637268},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.6190624833106995},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6179125905036926},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6113309860229492},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5887290835380554},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.5854052901268005},{"id":"https://openalex.org/keywords/independent-and-identically-distributed-random-variables","display_name":"Independent and identically distributed random variables","score":0.5511682033538818},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5240357518196106},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.4937339723110199},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.45940202474594116},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4481847584247589},{"id":"https://openalex.org/keywords/broadcast-communication-network","display_name":"Broadcast communication network","score":0.4308738112449646},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.42792823910713196},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.42029237747192383},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.319762647151947},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30428066849708557},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15418684482574463},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13034939765930176},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12889546155929565},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12061575055122375},{"id":"https://openalex.org/keywords/random-variable","display_name":"Random variable","score":0.11405381560325623}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7203086614608765},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.7059374451637268},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.6190624833106995},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6179125905036926},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6113309860229492},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5887290835380554},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.5854052901268005},{"id":"https://openalex.org/C141513077","wikidata":"https://www.wikidata.org/wiki/Q378542","display_name":"Independent and identically distributed random variables","level":3,"score":0.5511682033538818},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5240357518196106},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.4937339723110199},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.45940202474594116},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4481847584247589},{"id":"https://openalex.org/C83529365","wikidata":"https://www.wikidata.org/wiki/Q4972103","display_name":"Broadcast communication network","level":2,"score":0.4308738112449646},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.42792823910713196},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.42029237747192383},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.319762647151947},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30428066849708557},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15418684482574463},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13034939765930176},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12889546155929565},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12061575055122375},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.11405381560325623},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C170154142","wikidata":"https://www.wikidata.org/wiki/Q150737","display_name":"Architectural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit50566.2022.9834748","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834748","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320311687","display_name":"Ministry of Education","ror":"https://ror.org/03m01yf64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1010391471","https://openalex.org/W1981848655","https://openalex.org/W2023833893","https://openalex.org/W2099213070","https://openalex.org/W2108777864","https://openalex.org/W2135129768","https://openalex.org/W2145518237","https://openalex.org/W2153354110","https://openalex.org/W2159351168","https://openalex.org/W2168892181","https://openalex.org/W2178986096","https://openalex.org/W2560441363","https://openalex.org/W2570940965","https://openalex.org/W2608050028","https://openalex.org/W2775838555","https://openalex.org/W2887900476","https://openalex.org/W2910044495","https://openalex.org/W2962806269","https://openalex.org/W2976764014","https://openalex.org/W3013494863","https://openalex.org/W3017530323","https://openalex.org/W3089860534","https://openalex.org/W3098376129","https://openalex.org/W3105487184","https://openalex.org/W3119152637","https://openalex.org/W3129773144","https://openalex.org/W3141610964","https://openalex.org/W3176932558","https://openalex.org/W3184054995","https://openalex.org/W3198868326","https://openalex.org/W3211231951","https://openalex.org/W4213255380","https://openalex.org/W4221049158","https://openalex.org/W4226050082","https://openalex.org/W4289713099","https://openalex.org/W4300840296","https://openalex.org/W6645724763","https://openalex.org/W6783779181","https://openalex.org/W6798533863"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W4386057510","https://openalex.org/W2583477080","https://openalex.org/W3119439236","https://openalex.org/W1775217556"],"abstract_inverted_index":{"This":[0],"work":[1],"considers":[2],"mitigation":[3],"of":[4,33,49,70,95,114,125,164],"information":[5],"leakage":[6],"between":[7],"communication":[8,14,42,83,172,182],"and":[9,15,43,84,103,111,173,183],"sensing":[10,16,85,184],"operations":[11],"in":[12,28,152],"joint":[13,82,166,181],"systems.":[17],"Specifically,":[18],"a":[19,36,68,93,122,165,179],"discrete":[20],"memoryless":[21],"state-dependent":[22],"broadcast":[23,137],"channel":[24,44,90,138],"model":[25,75],"is":[26,52,129,133,139,146],"studied":[27],"which":[29,63,153],"(i)":[30],"the":[31,50,71,77,89,96,115,126,136,150,154],"presence":[32],"feedback":[34],"enables":[35],"transmitter":[37],"to":[38,67,149,169],"simultaneously":[39],"achieve":[40],"reliable":[41],"state":[45,58,91],"estimation;":[46],"(ii)":[47],"one":[48,87],"receivers":[51],"treated":[53],"as":[54,92],"an":[55],"eavesdropper":[56],"whose":[57],"should":[59,64,118,158],"be":[60,119,159],"estimated":[61],"but":[62],"remain":[65],"oblivious":[66],"part":[69,113],"transmitted":[72,116,156],"information.":[73],"The":[74,131,144,162],"abstracts":[76],"challenges":[78],"behind":[79],"security":[80],"for":[81],"if":[86],"views":[88],"characteristic":[94],"receiver,":[97],"e.g.,":[98],"its":[99],"location.":[100],"For":[101],"independent":[102],"identically":[104],"distributed":[105],"(i.i.d.)":[106],"states,":[107],"perfect":[108],"output":[109],"feedback,":[110],"when":[112,135],"message":[117,157],"kept":[120,160],"secret,":[121],"partial":[123],"characterization":[124,132,145],"secrecy-distortion":[127],"region":[128],"developed.":[130],"exact":[134],"either":[140],"physically-degraded":[141],"or":[142],"reversely-physically-degraded.":[143],"also":[147],"extended":[148],"situation":[151],"entire":[155],"secret.":[161],"benefits":[163],"approach":[167],"compared":[168],"separation-based":[170],"secure":[171],"state-sensing":[174],"methods":[175],"are":[176],"illustrated":[177],"with":[178],"binary":[180],"model.":[185]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
