{"id":"https://openalex.org/W4289655300","doi":"https://doi.org/10.1109/isit50566.2022.9834779","title":"MIMO Gaussain Cognitive Interference Channels With Confidential Messages","display_name":"MIMO Gaussain Cognitive Interference Channels With Confidential Messages","publication_year":2022,"publication_date":"2022-06-26","ids":{"openalex":"https://openalex.org/W4289655300","doi":"https://doi.org/10.1109/isit50566.2022.9834779"},"language":"en","primary_location":{"id":"doi:10.1109/isit50566.2022.9834779","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834779","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014227402","display_name":"Yinfei Xu","orcid":"https://orcid.org/0000-0003-3191-6903"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yinfei Xu","raw_affiliation_strings":["Southeast University,School of Information Science and Engineering,Nanjing,China,210096"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Information Science and Engineering,Nanjing,China,210096","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100378815","display_name":"Tong Zhang","orcid":"https://orcid.org/0000-0003-1148-4322"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tong Zhang","raw_affiliation_strings":["Southern University of Science and Technology,Department of Electrical and Electronic Engineering,Shenzhen,China,518055"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology,Department of Electrical and Electronic Engineering,Shenzhen,China,518055","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100432268","display_name":"Dong Yong","orcid":"https://orcid.org/0000-0001-7093-9142"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Dong","raw_affiliation_strings":["Southeast University,School of Information Science and Engineering,Nanjing,China,210096"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Information Science and Engineering,Nanjing,China,210096","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100648619","display_name":"Jian Lu","orcid":"https://orcid.org/0000-0003-3176-5607"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Lu","raw_affiliation_strings":["Southeast University,School of Information Science and Engineering,Nanjing,China,210096"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Information Science and Engineering,Nanjing,China,210096","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005242197","display_name":"Yili Xia","orcid":"https://orcid.org/0000-0002-4402-8131"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yili Xia","raw_affiliation_strings":["Southeast University,School of Information Science and Engineering,Nanjing,China,210096"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Information Science and Engineering,Nanjing,China,210096","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5014227402"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07486491,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2744","last_page":"2749"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.8098730444908142},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.6221569180488586},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.596923828125},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5564586520195007},{"id":"https://openalex.org/keywords/dirty-paper-coding","display_name":"Dirty paper coding","score":0.5223544836044312},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4766196310520172},{"id":"https://openalex.org/keywords/multi-user-mimo","display_name":"Multi-user MIMO","score":0.4758448600769043},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.45477813482284546},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.43045011162757874},{"id":"https://openalex.org/keywords/3g-mimo","display_name":"3G MIMO","score":0.4211844503879547},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.42106306552886963},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3923468291759491},{"id":"https://openalex.org/keywords/precoding","display_name":"Precoding","score":0.3443973660469055},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3390341103076935},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3373194932937622},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33725833892822266},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.32631462812423706},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.07269832491874695},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07255834341049194},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06640177965164185}],"concepts":[{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.8098730444908142},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.6221569180488586},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.596923828125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5564586520195007},{"id":"https://openalex.org/C2780186295","wikidata":"https://www.wikidata.org/wiki/Q3305007","display_name":"Dirty paper coding","level":5,"score":0.5223544836044312},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4766196310520172},{"id":"https://openalex.org/C91330434","wikidata":"https://www.wikidata.org/wiki/Q738298","display_name":"Multi-user MIMO","level":4,"score":0.4758448600769043},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.45477813482284546},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.43045011162757874},{"id":"https://openalex.org/C165650700","wikidata":"https://www.wikidata.org/wiki/Q4636347","display_name":"3G MIMO","level":4,"score":0.4211844503879547},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.42106306552886963},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3923468291759491},{"id":"https://openalex.org/C160562895","wikidata":"https://www.wikidata.org/wiki/Q7239557","display_name":"Precoding","level":4,"score":0.3443973660469055},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3390341103076935},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3373194932937622},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33725833892822266},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.32631462812423706},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.07269832491874695},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07255834341049194},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06640177965164185},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit50566.2022.9834779","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834779","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1660697917","https://openalex.org/W1848341083","https://openalex.org/W1965042169","https://openalex.org/W1997167847","https://openalex.org/W2003388165","https://openalex.org/W2014739224","https://openalex.org/W2030546921","https://openalex.org/W2039063251","https://openalex.org/W2043769961","https://openalex.org/W2110115072","https://openalex.org/W2111616148","https://openalex.org/W2119877332","https://openalex.org/W2120864408","https://openalex.org/W2134841917","https://openalex.org/W2148672861","https://openalex.org/W2167455364","https://openalex.org/W2908994854","https://openalex.org/W2977116167","https://openalex.org/W3193396119","https://openalex.org/W3196788406","https://openalex.org/W4302366875","https://openalex.org/W6800719695"],"related_works":["https://openalex.org/W2020347709","https://openalex.org/W2558549271","https://openalex.org/W1539855486","https://openalex.org/W2164743418","https://openalex.org/W3198080347","https://openalex.org/W2002714030","https://openalex.org/W2292905693","https://openalex.org/W2955097805","https://openalex.org/W4231582551","https://openalex.org/W1561198023"],"abstract_inverted_index":{"The":[0,49],"secrecy":[1],"capacity":[2,42],"of":[3,40,63],"the":[4,25,36,41,45,64,69,74,77,85,88,99],"multiple-input":[5],"multiple-output":[6],"(MIMO)":[7],"Gaussian":[8,30,70,90,101],"cognitive":[9],"interference":[10,102],"channel":[11,92],"with":[12],"common,":[13],"private":[14],"and":[15,59,93],"confidential":[16],"messages":[17],"is":[18,52,80],"characterized":[19],"in":[20,73],"this":[21],"paper.":[22],"To":[23,67],"show":[24],"achievability,":[26],"we":[27],"use":[28],"jointly":[29],"auxiliary":[31],"random":[32],"variables":[33],"to":[34],"evaluate":[35],"existing":[37],"single-letter":[38],"description":[39],"region":[43],"for":[44],"discrete":[46],"memoryless":[47],"channel.":[48,103],"converse":[50],"part":[51],"established":[53],"by":[54],"invoking":[55],"linear":[56],"estimation":[57],"theory":[58],"a":[60],"new":[61],"version":[62],"extremal":[65,75],"inequality.":[66],"resolve":[68],"optimality":[71],"problem":[72],"inequality,":[76],"perturbation":[78],"framework":[79],"employed.":[81],"Our":[82],"results":[83],"explore":[84],"connections":[86],"between":[87],"MIMO":[89,100],"broadcast":[91],"its":[94],"distributive":[95],"antennas":[96],"counterpart,":[97],"i.e.,":[98]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
