{"id":"https://openalex.org/W4312293819","doi":"https://doi.org/10.1109/lwc.2022.3223345","title":"Secure Two-Way Transmission via Autonomous Reconfigurable Intelligent Surface","display_name":"Secure Two-Way Transmission via Autonomous Reconfigurable Intelligent Surface","publication_year":2022,"publication_date":"2022-11-21","ids":{"openalex":"https://openalex.org/W4312293819","doi":"https://doi.org/10.1109/lwc.2022.3223345"},"language":"en","primary_location":{"id":"doi:10.1109/lwc.2022.3223345","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2022.3223345","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038040209","display_name":"Junshan Luo","orcid":"https://orcid.org/0000-0003-4151-5126"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junshan Luo","raw_affiliation_strings":["College of Electronic Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044446485","display_name":"Fanggang Wang","orcid":"https://orcid.org/0000-0001-8807-2807"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fanggang Wang","raw_affiliation_strings":["State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089256340","display_name":"Shilian Wang","orcid":"https://orcid.org/0000-0003-4132-8750"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shilian Wang","raw_affiliation_strings":["College of Electronic Science and Technology, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic Science and Technology, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038040209"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.2744,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.5400398,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"12","issue":"2","first_page":"262","last_page":"266"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.9570000171661377,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.889342188835144},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8106976747512817},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.6535513401031494},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6296234130859375},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6256237030029297},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.6204206347465515},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.6129510402679443},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5052502751350403},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.49951863288879395},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.4957512319087982},{"id":"https://openalex.org/keywords/transceiver","display_name":"Transceiver","score":0.47640717029571533},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.45361968874931335},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4509616792201996},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4205480217933655},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.41667285561561584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2172643542289734},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21588283777236938},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10214439034461975}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.889342188835144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8106976747512817},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.6535513401031494},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6296234130859375},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6256237030029297},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.6204206347465515},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.6129510402679443},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5052502751350403},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.49951863288879395},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.4957512319087982},{"id":"https://openalex.org/C7720470","wikidata":"https://www.wikidata.org/wiki/Q954187","display_name":"Transceiver","level":3,"score":0.47640717029571533},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.45361968874931335},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4509616792201996},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4205480217933655},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.41667285561561584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2172643542289734},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21588283777236938},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10214439034461975},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lwc.2022.3223345","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2022.3223345","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1654036738","display_name":null,"funder_award_id":"RCS2022ZT011","funder_id":"https://openalex.org/F4320323067","funder_display_name":"State Key Laboratory of Rail Traffic Control and Safety"},{"id":"https://openalex.org/G2680719155","display_name":null,"funder_award_id":"U1834210","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4328356222","display_name":null,"funder_award_id":"ZK20-40","funder_id":"https://openalex.org/F4320324150","funder_display_name":"National University of Defense Technology"},{"id":"https://openalex.org/G617548185","display_name":null,"funder_award_id":"2020JBM081","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7052355602","display_name":null,"funder_award_id":"2022JBQY004","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7790135856","display_name":null,"funder_award_id":"62171445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8741220076","display_name":null,"funder_award_id":"62201590","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323067","display_name":"State Key Laboratory of Rail Traffic Control and Safety","ror":"https://ror.org/01yj56c84"},{"id":"https://openalex.org/F4320324150","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2069980512","https://openalex.org/W2072863821","https://openalex.org/W2750492424","https://openalex.org/W2899787083","https://openalex.org/W2945534522","https://openalex.org/W3040433108","https://openalex.org/W3048090405","https://openalex.org/W3096339934","https://openalex.org/W3108462255","https://openalex.org/W3110826876","https://openalex.org/W3111012323","https://openalex.org/W3132465714","https://openalex.org/W3134459480","https://openalex.org/W3198753883"],"related_works":["https://openalex.org/W1993671760","https://openalex.org/W3026778509","https://openalex.org/W2462883630","https://openalex.org/W4391308034","https://openalex.org/W4287776800","https://openalex.org/W2951619176","https://openalex.org/W2376754011","https://openalex.org/W2786811319","https://openalex.org/W4285103104","https://openalex.org/W2972651196"],"abstract_inverted_index":{"In":[0,54,73],"this":[1],"letter,":[2],"we":[3,57],"propose":[4],"a":[5],"secure":[6,49],"two-way":[7,50,80],"communication":[8],"scheme":[9,36,135,170],"using":[10],"an":[11,64],"autonomous":[12],"reconfigurable":[13],"intelligent":[14],"surface":[15],"(RIS)":[16],"to":[17,62,120,144,171,173,183],"protect":[18],"the":[19,42,48,59,67,76,79,85,88,98,111,115,122,126,133,140,145,147,150,160,164,168,194,197],"information":[20,71],"exchange":[21],"between":[22,187],"two":[23,39],"legitimate":[24,123],"nodes,":[25],"both":[26,174],"equipped":[27],"with":[28],"full-duplex":[29],"radios,":[30],"against":[31],"passive":[32],"eavesdropping.":[33],"The":[34,92,152],"proposed":[35,134,169,198],"consists":[37],"of":[38,66,78,87,125,159,196],"stages,":[40],"i.e.,":[41],"secret":[43,68,90,153],"channel":[44,69],"estimation":[45,65],"stage":[46,55,74],"and":[47,101,166,176,189],"data":[51],"transmission":[52,81],"stage.":[53],"1,":[56],"use":[58],"Takagi":[60],"decomposition":[61],"obtain":[63],"state":[70],"(CSI).":[72],"2,":[75],"secrecy":[77],"is":[82,142,155],"protected":[83],"by":[84],"randomness":[86],"estimated":[89],"CSI.":[91],"reflection":[93,127],"patterns":[94],"are":[95,102,181],"determined":[96],"at":[97,110],"RIS":[99,116],"autonomously":[100],"carefully":[103],"designed":[104,182],"such":[105],"that":[106],"they":[107],"become":[108],"transparent":[109],"receiver":[112],"side.":[113],"Moreover,":[114],"does":[117],"not":[118],"need":[119],"inform":[121],"nodes":[124],"patterns.":[128],"Without":[129],"any":[130],"pre-shared":[131],"information,":[132],"prohibits":[136],"eavesdropping":[137],"even":[138],"if":[139],"eavesdropper":[141],"close":[143],"transmitter,":[146],"receiver,":[148],"or":[149],"RIS.":[151],"CSI":[154],"updated":[156],"in":[157],"each":[158],"transmission,":[161],"which":[162],"reduces":[163],"overhead":[165],"enables":[167],"apply":[172],"stable":[175],"varying":[177],"channels.":[178],"Two":[179],"transceivers":[180],"achieve":[184],"different":[185],"balances":[186],"efficiency":[188],"complexity.":[190],"Numerical":[191],"results":[192],"verify":[193],"effectiveness":[195],"scheme.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
