{"id":"https://openalex.org/W4376455339","doi":"https://doi.org/10.1109/jsait.2023.3275048","title":"Secure Integrated Sensing and Communication","display_name":"Secure Integrated Sensing and Communication","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4376455339","doi":"https://doi.org/10.1109/jsait.2023.3275048"},"language":"en","primary_location":{"id":"doi:10.1109/jsait.2023.3275048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsait.2023.3275048","pdf_url":null,"source":{"id":"https://openalex.org/S4210211895","display_name":"IEEE Journal on Selected Areas in Information Theory","issn_l":"2641-8770","issn":["2641-8770"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016620064","display_name":"Onur G\u00fcnl\u00fc","orcid":"https://orcid.org/0000-0002-0313-7788"},"institutions":[{"id":"https://openalex.org/I102134673","display_name":"Link\u00f6ping University","ror":"https://ror.org/05ynxx418","country_code":"SE","type":"education","lineage":["https://openalex.org/I102134673"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Onur G\u00fcnl\u00fc","raw_affiliation_strings":["Information Coding Division, Link&#x00F6;ping University, Link&#x00F6;ping, Sweden"],"affiliations":[{"raw_affiliation_string":"Information Coding Division, Link&#x00F6;ping University, Link&#x00F6;ping, Sweden","institution_ids":["https://openalex.org/I102134673"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055689993","display_name":"Matthieu R. Bloch","orcid":"https://orcid.org/0000-0001-9315-9050"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthieu R. Bloch","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038203207","display_name":"Rafael F. Schaefer","orcid":"https://orcid.org/0000-0002-1702-9075"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rafael F. Schaefer","raw_affiliation_strings":["Chair of Information Theory and Machine Learning, the BMBF Research Hub 6G-life, the Cluster of Excellence &#x201C;Centre for Tactile Internet with Human-in-the-Loop (CeTI),&#x201D; and the 5G Lab Germany, Technische Universit&#x00E4;t of Dresden, Dresden, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of Information Theory and Machine Learning, the BMBF Research Hub 6G-life, the Cluster of Excellence &#x201C;Centre for Tactile Internet with Human-in-the-Loop (CeTI),&#x201D; and the 5G Lab Germany, Technische Universit&#x00E4;t of Dresden, Dresden, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039328157","display_name":"Aylin Yener","orcid":"https://orcid.org/0000-0003-0820-3390"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aylin Yener","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016620064"],"corresponding_institution_ids":["https://openalex.org/I102134673"],"apc_list":null,"apc_paid":null,"fwci":7.118,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.97748861,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"4","issue":null,"first_page":"40","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7298835515975952},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6750706434249878},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6468384861946106},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.6375860571861267},{"id":"https://openalex.org/keywords/independent-and-identically-distributed-random-variables","display_name":"Independent and identically distributed random variables","score":0.5932374596595764},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5628570914268494},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.5493738651275635},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5375893115997314},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5065044164657593},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.5052908062934875},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4646316170692444},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4387499690055847},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.43619489669799805},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42873668670654297},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3662370443344116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3544706106185913},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.27196168899536133},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18661966919898987},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1680016815662384},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15362876653671265},{"id":"https://openalex.org/keywords/random-variable","display_name":"Random variable","score":0.10405004024505615},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09856510162353516}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7298835515975952},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6750706434249878},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6468384861946106},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.6375860571861267},{"id":"https://openalex.org/C141513077","wikidata":"https://www.wikidata.org/wiki/Q378542","display_name":"Independent and identically distributed random variables","level":3,"score":0.5932374596595764},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5628570914268494},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.5493738651275635},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5375893115997314},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5065044164657593},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.5052908062934875},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4646316170692444},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4387499690055847},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.43619489669799805},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42873668670654297},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3662370443344116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3544706106185913},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.27196168899536133},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18661966919898987},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1680016815662384},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15362876653671265},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.10405004024505615},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09856510162353516},{"id":"https://openalex.org/C170154142","wikidata":"https://www.wikidata.org/wiki/Q150737","display_name":"Architectural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsait.2023.3275048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsait.2023.3275048","pdf_url":null,"source":{"id":"https://openalex.org/S4210211895","display_name":"IEEE Journal on Selected Areas in Information Theory","issn_l":"2641-8770","issn":["2641-8770"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G379016537","display_name":null,"funder_award_id":"SCHA 1944/9-1","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G6270499413","display_name":null,"funder_award_id":"16KISK001K","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G7099879521","display_name":null,"funder_award_id":"CCF 1955401","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8769178198","display_name":null,"funder_award_id":"2148400","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"},{"id":"https://openalex.org/F4320320940","display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","ror":"https://ror.org/044wr7g58"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1010391471","https://openalex.org/W1970402036","https://openalex.org/W1981848655","https://openalex.org/W2023833893","https://openalex.org/W2099213070","https://openalex.org/W2108777864","https://openalex.org/W2127276562","https://openalex.org/W2135129768","https://openalex.org/W2145518237","https://openalex.org/W2153354110","https://openalex.org/W2159351168","https://openalex.org/W2178986096","https://openalex.org/W2323053868","https://openalex.org/W2570940965","https://openalex.org/W2608050028","https://openalex.org/W2775838555","https://openalex.org/W2887900476","https://openalex.org/W2972406350","https://openalex.org/W2976764014","https://openalex.org/W3013494863","https://openalex.org/W3017530323","https://openalex.org/W3089860534","https://openalex.org/W3098376129","https://openalex.org/W3104141042","https://openalex.org/W3105487184","https://openalex.org/W3119152637","https://openalex.org/W3129773144","https://openalex.org/W3141610964","https://openalex.org/W3176932558","https://openalex.org/W3184054995","https://openalex.org/W3191750312","https://openalex.org/W3198868326","https://openalex.org/W3211231951","https://openalex.org/W4213255380","https://openalex.org/W4220879580","https://openalex.org/W4221049158","https://openalex.org/W4289655465","https://openalex.org/W4289713099","https://openalex.org/W4300840296","https://openalex.org/W4302366875","https://openalex.org/W4380763437","https://openalex.org/W6783779181","https://openalex.org/W6798533863","https://openalex.org/W6841070923"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W4243812570","https://openalex.org/W4300441478","https://openalex.org/W4386057510","https://openalex.org/W2583477080"],"abstract_inverted_index":{"This":[0],"work":[1],"considers":[2],"the":[3,32,50,70,76,88,110,121,131,146,150],"problem":[4],"of":[5,34,49,69,109,120,160],"mitigating":[6],"information":[7],"leakage":[8],"between":[9],"communication":[10,82,168,177],"and":[11,83,99,106,169,178],"sensing":[12,84,179],"in":[13,29,148],"systems":[14],"jointly":[15],"performing":[16,44],"both":[17],"operations.":[18],"Specifically,":[19],"a":[20,37,92,117,161],"discrete":[21],"memoryless":[22],"state-dependent":[23],"broadcast":[24,132],"channel":[25,45,89,133],"model":[26,74],"is":[27,52,124,128,134,142],"studied":[28],"which":[30,63,149],"(i)":[31],"presence":[33],"feedback":[35],"enables":[36],"transmitter":[38],"to":[39,67,145,165],"convey":[40],"information,":[41],"while":[42],"simultaneously":[43],"state":[46,58,90],"estimation;":[47],"one":[48,86],"receivers":[51],"treated":[53],"as":[54,91],"an":[55],"eavesdropper":[56],"whose":[57],"should":[59,64,113,154],"be":[60,114,155],"estimated":[61],"but":[62],"remain":[65],"oblivious":[66],"part":[68,108],"transmitted":[71,111,152],"information.":[72],"The":[73,126,139,158],"abstracts":[75],"challenges":[77],"behind":[78],"security":[79],"for":[80],"joint":[81,162,176],"if":[85],"views":[87],"key":[93],"attribute,":[94],"e.g.,":[95],"location.":[96],"For":[97],"independent":[98],"identically":[100],"distributed":[101],"states,":[102],"perfect":[103],"output":[104],"feedback,":[105],"when":[107,130],"message":[112,153],"kept":[115,156],"secret,":[116],"partial":[118,140],"characterization":[119,127,141],"secrecy-distortion":[122],"region":[123],"developed.":[125],"exact":[129],"either":[135],"physically-degraded":[136],"or":[137],"reversely-physically-degraded.":[138],"also":[143],"extended":[144],"situation":[147],"entire":[151],"secret.":[157],"benefits":[159],"approach":[163],"compared":[164],"separation-based":[166],"secure":[167],"state-sensing":[170],"methods":[171],"are":[172],"illustrated":[173],"with":[174],"binary":[175],"models.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":24},{"year":2023,"cited_by_count":5}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
