{"id":"https://openalex.org/W3033704723","doi":"https://doi.org/10.1109/lwc.2020.2999361","title":"Unified Framework for Secrecy Characteristics With Mixture of Gaussian (MoG) Distribution","display_name":"Unified Framework for Secrecy Characteristics With Mixture of Gaussian (MoG) Distribution","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3033704723","doi":"https://doi.org/10.1109/lwc.2020.2999361","mag":"3033704723"},"language":"en","primary_location":{"id":"doi:10.1109/lwc.2020.2999361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2020.2999361","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orbilu.uni.lu/handle/10993/43869","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007014802","display_name":"Long Kong","orcid":"https://orcid.org/0000-0001-6963-7489"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Long Kong","raw_affiliation_strings":["Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, Luxembourg City, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, Luxembourg City, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016154330","display_name":"Symeon Chatzinotas","orcid":"https://orcid.org/0000-0001-5122-0001"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Symeon Chatzinotas","raw_affiliation_strings":["Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, Luxembourg City, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, Luxembourg City, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080037825","display_name":"Bj\u00f6rn Ottersten","orcid":"https://orcid.org/0000-0003-2298-6774"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Bjorn Ottersten","raw_affiliation_strings":["Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, Luxembourg City, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, Luxembourg City, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007014802"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":0.8314,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.72562469,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"9","issue":"10","first_page":"1625","last_page":"1628"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8272556066513062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7127645611763},{"id":"https://openalex.org/keywords/mixture-model","display_name":"Mixture model","score":0.5346419215202332},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.5284770727157593},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5209266543388367},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.5064314603805542},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.4935835599899292},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4776493310928345},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4738512337207794},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.44967418909072876},{"id":"https://openalex.org/keywords/probability-distribution","display_name":"Probability distribution","score":0.43604880571365356},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.43572473526000977},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4034575819969177},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.33838069438934326},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2939791679382324},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22817936539649963},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.1481407880783081},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1396287977695465},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09192606806755066},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06381618976593018}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8272556066513062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7127645611763},{"id":"https://openalex.org/C61224824","wikidata":"https://www.wikidata.org/wiki/Q2260434","display_name":"Mixture model","level":2,"score":0.5346419215202332},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.5284770727157593},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5209266543388367},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.5064314603805542},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.4935835599899292},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4776493310928345},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4738512337207794},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.44967418909072876},{"id":"https://openalex.org/C149441793","wikidata":"https://www.wikidata.org/wiki/Q200726","display_name":"Probability distribution","level":2,"score":0.43604880571365356},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.43572473526000977},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4034575819969177},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33838069438934326},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2939791679382324},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22817936539649963},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.1481407880783081},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1396287977695465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09192606806755066},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06381618976593018},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/lwc.2020.2999361","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2020.2999361","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},{"id":"pmh:oai:orbilu.uni.lu:10993/43869","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/43869","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null}],"best_oa_location":{"id":"pmh:oai:orbilu.uni.lu:10993/43869","is_oa":true,"landing_page_url":"https://orbilu.uni.lu/handle/10993/43869","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":null},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2030835564","https://openalex.org/W2031230704","https://openalex.org/W2053336065","https://openalex.org/W2145989463","https://openalex.org/W2156214717","https://openalex.org/W2180091920","https://openalex.org/W2293476944","https://openalex.org/W2342808852","https://openalex.org/W2802595113","https://openalex.org/W2815431952","https://openalex.org/W2886764297","https://openalex.org/W2887832054","https://openalex.org/W2895931498","https://openalex.org/W2897052904","https://openalex.org/W2943221627","https://openalex.org/W2964244518","https://openalex.org/W2968701211","https://openalex.org/W3100608448","https://openalex.org/W3113221786","https://openalex.org/W6685565187"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2475541339","https://openalex.org/W2107199751","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W99756173","https://openalex.org/W4300441478","https://openalex.org/W2062965938","https://openalex.org/W4243812570","https://openalex.org/W2915026029"],"abstract_inverted_index":{"The":[0,69,80],"mixture":[1],"of":[2,32,50,54,82],"Gaussian":[3],"(MoG)":[4],"distribution":[5],"was":[6],"proposed":[7],"to":[8,37],"model":[9],"the":[10,15,23,30,39,47,52,60,66,111],"wireless":[11],"channels":[12],"by":[13],"implementing":[14],"completely":[16],"unsupervised":[17],"expectation-maximization":[18],"(EM)":[19],"learning":[20],"algorithm.":[21],"With":[22],"high":[24],"convenience":[25],"for":[26],"density":[27],"estimation":[28],"applications,":[29],"focus":[31],"this":[33,99],"letter":[34,100],"is":[35],"supposed":[36],"investigate":[38],"secrecy":[40,43,56,62,107],"metrics,":[41],"including":[42],"outage":[44],"probability":[45,53],"(SOP),":[46],"lower":[48],"bound":[49],"SOP,":[51],"non-zero":[55],"capacity":[57,63],"(PNZ),":[58],"and":[59,76,90],"average":[61],"(ASC)":[64],"from":[65],"information-theoretic":[67],"perspective.":[68],"above-mentioned":[70],"metrics":[71],"are":[72,87],"derived":[73],"with":[74,92],"simple":[75,103],"unified":[77],"closed-form":[78,106],"expressions.":[79],"effectiveness":[81],"our":[83],"obtained":[84],"analytical":[85],"expressions":[86],"successfully":[88],"examined":[89],"compared":[91],"Monte-Carlo":[93],"simulations.":[94],"One":[95],"can":[96],"conclude":[97],"that":[98],"provides":[101],"a":[102],"but":[104],"effective":[105],"analysis":[108],"solution":[109],"exploiting":[110],"MoG":[112],"distribution.":[113]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
