{"id":"https://openalex.org/W3120545056","doi":"https://doi.org/10.1109/lnet.2021.3051757","title":"Decoding Orders for Securing Untrusted NOMA","display_name":"Decoding Orders for Securing Untrusted NOMA","publication_year":2021,"publication_date":"2021-01-14","ids":{"openalex":"https://openalex.org/W3120545056","doi":"https://doi.org/10.1109/lnet.2021.3051757","mag":"3120545056"},"language":"en","primary_location":{"id":"doi:10.1109/lnet.2021.3051757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lnet.2021.3051757","pdf_url":null,"source":{"id":"https://openalex.org/S4210234060","display_name":"IEEE Networking Letters","issn_l":"2576-3156","issn":["2576-3156"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Networking Letters","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2103.16478","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sapna Thapar","orcid":"https://orcid.org/0000-0002-8080-963X"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sapna Thapar","raw_affiliation_strings":["Department of Electrical Engineering, Indian Institute of Technology Jammu, Jammu, India"],"raw_orcid":"https://orcid.org/0000-0002-8080-963X","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Indian Institute of Technology Jammu, Jammu, India","institution_ids":["https://openalex.org/I4210127441"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Deepak Mishra","orcid":"https://orcid.org/0000-0002-3225-6495"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Deepak Mishra","raw_affiliation_strings":["School of Electrical Engineering and Telecommunications, University of New South Wales Sydney, Sydney, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0002-3225-6495","affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Telecommunications, University of New South Wales Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ravikant Saini","orcid":"https://orcid.org/0000-0001-7879-9754"},"institutions":[{"id":"https://openalex.org/I4210127441","display_name":"Indian Institute of Technology Jammu","ror":"https://ror.org/02f0vsw63","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210127441"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ravikant Saini","raw_affiliation_strings":["Department of Electrical Engineering, Indian Institute of Technology Jammu, Jammu, India"],"raw_orcid":"https://orcid.org/0000-0001-7879-9754","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Indian Institute of Technology Jammu, Jammu, India","institution_ids":["https://openalex.org/I4210127441"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210127441"],"apc_list":null,"apc_paid":null,"fwci":1.2201,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.78139807,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"3","issue":"1","first_page":"27","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.0066999997943639755,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.0003000000142492354,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.9244999885559082},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8242999911308289},{"id":"https://openalex.org/keywords/noma","display_name":"Noma","score":0.6833999752998352},{"id":"https://openalex.org/keywords/list-decoding","display_name":"List decoding","score":0.6194999814033508},{"id":"https://openalex.org/keywords/sequential-decoding","display_name":"Sequential decoding","score":0.4650000035762787},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.45489999651908875}],"concepts":[{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.9244999885559082},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8242999911308289},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7103000283241272},{"id":"https://openalex.org/C2775918612","wikidata":"https://www.wikidata.org/wiki/Q994794","display_name":"Noma","level":3,"score":0.6833999752998352},{"id":"https://openalex.org/C204397858","wikidata":"https://www.wikidata.org/wiki/Q4437907","display_name":"List decoding","level":5,"score":0.6194999814033508},{"id":"https://openalex.org/C193969084","wikidata":"https://www.wikidata.org/wiki/Q7452500","display_name":"Sequential decoding","level":4,"score":0.4650000035762787},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.45489999651908875},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4180000126361847},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3959999978542328},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.3806999921798706},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3345000147819519},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28200000524520874},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.2754000127315521},{"id":"https://openalex.org/C132727834","wikidata":"https://www.wikidata.org/wiki/Q4892328","display_name":"Berlekamp\u2013Welch algorithm","level":5,"score":0.2732999920845032},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2669999897480011}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/lnet.2021.3051757","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lnet.2021.3051757","pdf_url":null,"source":{"id":"https://openalex.org/S4210234060","display_name":"IEEE Networking Letters","issn_l":"2576-3156","issn":["2576-3156"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Networking Letters","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2103.16478","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2103.16478","pdf_url":"https://arxiv.org/pdf/2103.16478","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:unsworks.library.unsw.edu.au:1959.4/unsworks_74977","is_oa":true,"landing_page_url":"http://hdl.handle.net/1959.4/unsworks_74977","pdf_url":null,"source":{"id":"https://openalex.org/S4306401737","display_name":"UNSWorks (University of New South Wales, Sydney, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40053085","host_organization_name":"Australian Defence Force Academy","host_organization_lineage":["https://openalex.org/I40053085"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Networking Letters, 3, 1, 27-30","raw_type":"http://purl.org/coar/resource_type/c_6501"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2103.16478","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2103.16478","pdf_url":"https://arxiv.org/pdf/2103.16478","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320313903","display_name":"Tata Consultancy Services","ror":"https://ror.org/01b9n8m42"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2184092541","https://openalex.org/W2509696551","https://openalex.org/W2582744858","https://openalex.org/W2602969806","https://openalex.org/W2769456309","https://openalex.org/W2898104747","https://openalex.org/W2917997479","https://openalex.org/W2964110041","https://openalex.org/W3085560976"],"related_works":[],"abstract_inverted_index":{"This":[0],"letter":[1],"focuses":[2],"on":[3,58],"exploring":[4],"a":[5,37,66,90],"new":[6],"decoding":[7,31,38,55,80],"order":[8,39],"to":[9,69],"resolve":[10],"the":[11,26,50,71,77,86,97],"secrecy":[12,43],"issue":[13],"among":[14],"untrusted":[15],"non-orthogonal":[16],"multiple":[17],"access":[18],"users.":[19],"In":[20],"this":[21,59],"context,":[22],"firstly,":[23],"we":[24,35,64],"identify":[25],"total":[27],"number":[28,51],"of":[29,52,93],"possible":[30],"orders":[32,56],"analytically.":[33],"Then,":[34],"propose":[36],"strategy":[40,61],"ensuring":[41],"positive":[42],"rate":[44],"for":[45],"all":[46],"users,":[47],"and":[48],"obtain":[49],"feasible":[53],"secure":[54,79],"based":[57],"proposed":[60],"numerically.":[62],"Thereafter,":[63],"present":[65],"suboptimal":[67,87],"policy":[68],"avoid":[70],"computational":[72],"complexity":[73],"involved":[74],"in":[75],"finding":[76],"best":[78],"order.":[81],"Numerical":[82],"results":[83],"illustrate":[84],"that":[85],"solution":[88],"provides":[89],"performance":[91],"gain":[92],"about":[94],"137%":[95],"over":[96],"relevant":[98],"benchmark.":[99]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2021-01-18T00:00:00"}
