{"id":"https://openalex.org/W4405936034","doi":"https://doi.org/10.1109/lwc.2024.3524385","title":"Secrecy Rate Maximization for MIMO DFRC System With Statistical CSI","display_name":"Secrecy Rate Maximization for MIMO DFRC System With Statistical CSI","publication_year":2024,"publication_date":"2024-12-31","ids":{"openalex":"https://openalex.org/W4405936034","doi":"https://doi.org/10.1109/lwc.2024.3524385"},"language":"en","primary_location":{"id":"doi:10.1109/lwc.2024.3524385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2024.3524385","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yilong Liu","orcid":"https://orcid.org/0009-0004-3663-7262"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yilong Liu","raw_affiliation_strings":["Jiangsu Key Laboratory of Wireless Communications, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Wireless Communications, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100433204","display_name":"Jun Zhang","orcid":"https://orcid.org/0000-0002-8232-2171"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Zhang","raw_affiliation_strings":["Jiangsu Key Laboratory of Wireless Communications, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Wireless Communications, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010228669","display_name":"Yongxu Zhu","orcid":"https://orcid.org/0000-0002-5413-1968"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongxu Zhu","raw_affiliation_strings":["National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013079905","display_name":"Shi Jin","orcid":"https://orcid.org/0000-0003-0271-6021"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shi Jin","raw_affiliation_strings":["National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100375264","display_name":"Xiao Li","orcid":"https://orcid.org/0000-0001-9660-9053"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Li","raw_affiliation_strings":["National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.683,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77479786,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"14","issue":"3","first_page":"811","last_page":"815"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9627000093460083,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.958299994468689,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6854419708251953},{"id":"https://openalex.org/keywords/maximization","display_name":"Maximization","score":0.684403657913208},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.6817687749862671},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6460546851158142},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.35564637184143066},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2830297350883484},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23782581090927124},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17227843403816223},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.13560700416564941}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6854419708251953},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.684403657913208},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.6817687749862671},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6460546851158142},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.35564637184143066},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2830297350883484},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23782581090927124},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17227843403816223},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.13560700416564941}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lwc.2024.3524385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2024.3524385","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1003364742","display_name":null,"funder_award_id":"62261160576","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1465642694","display_name":null,"funder_award_id":"62071247","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7101942999","display_name":null,"funder_award_id":"BE2023022-1","funder_id":"https://openalex.org/F4320335956","funder_display_name":"Key Technologies Research and Development Program of Guangzhou"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327777","display_name":"Jiangsu Provincial Key Research and Development Program","ror":null},{"id":"https://openalex.org/F4320335956","display_name":"Key Technologies Research and Development Program of Guangzhou","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2096171043","https://openalex.org/W2129755576","https://openalex.org/W2135137654","https://openalex.org/W2296017068","https://openalex.org/W2796012054","https://openalex.org/W3194620979","https://openalex.org/W4223477331","https://openalex.org/W4313591677","https://openalex.org/W4379116905","https://openalex.org/W4380763437","https://openalex.org/W4385063025","https://openalex.org/W4398187683","https://openalex.org/W4399110229","https://openalex.org/W4399951424","https://openalex.org/W4401387027","https://openalex.org/W4401692213"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2107199751","https://openalex.org/W2037938733"],"abstract_inverted_index":{"This":[0],"letter":[1],"addresses":[2],"a":[3,21,58],"security":[4],"concern":[5],"of":[6,28,89],"the":[7,16,36,41,48,75,87,90],"multiple-input":[8],"multiple-output":[9],"(MIMO)":[10],"dual-functional":[11],"radar-communication":[12],"(DFRC)":[13],"system":[14],"where":[15],"target":[17],"is":[18,33],"regarded":[19],"as":[20],"potential":[22],"eavesdropper.":[23],"A":[24],"non-convex":[25],"optimization":[26],"problem":[27],"ergodic":[29,78],"secrecy":[30,79],"rate":[31,80],"maximization":[32],"formulated":[34],"under":[35],"transmit":[37,42,61],"power":[38],"constraint":[39],"and":[40,52,73,81],"waveform":[43],"similarity":[44],"constraint.":[45],"By":[46],"using":[47],"large-system":[49],"analysis":[50],"results":[51],"Taylor":[53],"series":[54],"approximation,":[55],"we":[56],"derive":[57],"closed-form":[59],"optimal":[60],"covariance":[62],"matrix,":[63],"which":[64],"only":[65],"depends":[66],"on":[67],"statistical":[68],"channel":[69],"state":[70],"information":[71],"(CSI)":[72],"facilitates":[74],"trade-off":[76],"between":[77],"radar":[82],"beampattern.":[83],"Numerical":[84],"simulations":[85],"demonstrate":[86],"effectiveness":[88],"proposed":[91],"method.":[92]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
