{"id":"https://openalex.org/W4386524159","doi":"https://doi.org/10.1109/lwc.2023.3312689","title":"Covert and Secure Communications in NOMA Networks With Internal Eavesdropping","display_name":"Covert and Secure Communications in NOMA Networks With Internal Eavesdropping","publication_year":2023,"publication_date":"2023-09-07","ids":{"openalex":"https://openalex.org/W4386524159","doi":"https://doi.org/10.1109/lwc.2023.3312689"},"language":"en","primary_location":{"id":"doi:10.1109/lwc.2023.3312689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2023.3312689","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100429997","display_name":"Qiang Li","orcid":"https://orcid.org/0000-0002-7156-0713"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiang Li","raw_affiliation_strings":["School of Information and Communication Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100734239","display_name":"Dongyang Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]},{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongyang Xu","raw_affiliation_strings":["School of Information and Communication Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022880485","display_name":"Keivan Navaie","orcid":"https://orcid.org/0000-0002-4399-6472"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Keivan Navaie","raw_affiliation_strings":["School of Computing and Communications, Lancaster University, Lancaster, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Communications, Lancaster University, Lancaster, U.K","institution_ids":["https://openalex.org/I67415387"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002904166","display_name":"Zhiguo Ding","orcid":"https://orcid.org/0000-0001-5280-384X"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Zhiguo Ding","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100429997"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":2.598,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.90221843,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"12","issue":"12","first_page":"2178","last_page":"2182"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10500","display_name":"Sparse and Compressive Sensing Techniques","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9547024965286255},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8037912845611572},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6290925741195679},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.570654034614563},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.546721339225769},{"id":"https://openalex.org/keywords/noma","display_name":"Noma","score":0.5385324954986572},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.5188904404640198},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.48640871047973633},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4650750160217285},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4239940941333771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29535913467407227},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.2140035331249237},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.19240358471870422},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18930718302726746},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.09568285942077637}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9547024965286255},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8037912845611572},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6290925741195679},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.570654034614563},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.546721339225769},{"id":"https://openalex.org/C2775918612","wikidata":"https://www.wikidata.org/wiki/Q994794","display_name":"Noma","level":3,"score":0.5385324954986572},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.5188904404640198},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.48640871047973633},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4650750160217285},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4239940941333771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29535913467407227},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.2140035331249237},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.19240358471870422},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18930718302726746},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.09568285942077637},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/lwc.2023.3312689","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2023.3312689","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},{"id":"pmh:oai:eprints.lancs.ac.uk:207092","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7599999904632568}],"awards":[{"id":"https://openalex.org/G5981593502","display_name":null,"funder_award_id":"2023D13","funder_id":"https://openalex.org/F4320324856","funder_display_name":"Southeast University"},{"id":"https://openalex.org/G8963086430","display_name":null,"funder_award_id":"2022YFB2902203","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320324856","display_name":"Southeast University","ror":"https://ror.org/04ct4d772"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2117495562","https://openalex.org/W2398987396","https://openalex.org/W2793190854","https://openalex.org/W2886997539","https://openalex.org/W3011949521","https://openalex.org/W3044223429","https://openalex.org/W3134856335","https://openalex.org/W3185937649","https://openalex.org/W4221160108","https://openalex.org/W4225716271","https://openalex.org/W4292793902","https://openalex.org/W4312620418","https://openalex.org/W4312687534","https://openalex.org/W4361802267","https://openalex.org/W4362500847"],"related_works":["https://openalex.org/W1993671760","https://openalex.org/W2795815818","https://openalex.org/W2376754011","https://openalex.org/W3026778509","https://openalex.org/W4389151493","https://openalex.org/W2946164306","https://openalex.org/W2462883630","https://openalex.org/W2951619176","https://openalex.org/W4287776800","https://openalex.org/W2183269049"],"abstract_inverted_index":{"This":[0],"letter":[1],"proposes":[2],"a":[3,52],"joint":[4],"covert":[5,141],"and":[6,20,119,154],"secure":[7],"transmission":[8],"scheme":[9],"in":[10],"the":[11,24,26,30,33,41,45,50,65,69,75,79,83,87,100,104,109,111,116,120,125,129,137,148,151,163,166],"non-orthogonal":[12],"multiple":[13],"access":[14],"(NOMA)":[15],"networks":[16],"against":[17],"internal":[18],"eavesdropping":[19,66],"external":[21,38],"monitoring.":[22],"In":[23],"network,":[25],"strong":[27,46,70],"user":[28,35,71,127],"wiretaps":[29],"signals":[31],"of":[32,44,68,103,108,115,124,150,165],"weak":[34,126],"while":[36],"an":[37,139],"warden":[39,84],"monitors":[40],"communication":[42],"behaviors":[43],"user.":[47],"To":[48,135],"address":[49],"issue,":[51],"random":[53],"artificial":[54],"noise":[55],"(AN)":[56],"based":[57],"beamforming":[58],"is":[59,145,157],"adopted,":[60],"which":[61,156],"not":[62],"only":[63],"reduces":[64],"rate":[67,142],"but":[72],"also":[73],"confuses":[74],"warden.":[76],"We":[77],"consider":[78],"worst":[80],"case,":[81],"where":[82],"can":[85],"minimize":[86],"detection":[88,95],"error":[89],"probability":[90,123],"(DEP)":[91],"by":[92],"optimizing":[93],"its":[94],"threshold.":[96],"Further,":[97],"we":[98],"characterize":[99],"closed-form":[101],"expressions":[102],"average":[105],"minimum":[106],"DEP":[107],"warden,":[110],"connection":[112],"outage":[113,122],"probabilities":[114],"NOMA":[117],"users":[118],"secrecy":[121],"under":[128,147],"imperfect":[130],"successive":[131],"interference":[132],"cancellation":[133],"(SIC).":[134],"improve":[136],"performance,":[138],"effective":[140],"maximization":[143],"problem":[144],"formulated,":[146],"constraints":[149],"covertness,":[152],"reliability":[153],"secrecy,":[155],"analytically":[158],"solved.":[159],"Numerical":[160],"results":[161],"validate":[162],"superiority":[164],"proposed":[167],"scheme.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
