{"id":"https://openalex.org/W2919806629","doi":"https://doi.org/10.1109/tencon.2018.8650482","title":"Security Transmission Designs in Two-Way Relay Wireless Networks","display_name":"Security Transmission Designs in Two-Way Relay Wireless Networks","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2919806629","doi":"https://doi.org/10.1109/tencon.2018.8650482","mag":"2919806629"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2018.8650482","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650482","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060113486","display_name":"Miao Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Miao Luo","raw_affiliation_strings":["Xi\u2019an Jiaotong University, Xi\u2019an, P.R.China","Xi'an Jiaotong University, Xi'an, P.R.China"],"affiliations":[{"raw_affiliation_string":"Xi\u2019an Jiaotong University, Xi\u2019an, P.R.China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi'an Jiaotong University, Xi'an, P.R.China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100512532","display_name":"Qinye Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinye Yin","raw_affiliation_strings":["Xi\u2019an Jiaotong University, Xi\u2019an, P.R.China","Xi'an Jiaotong University, Xi'an, P.R.China"],"affiliations":[{"raw_affiliation_string":"Xi\u2019an Jiaotong University, Xi\u2019an, P.R.China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi'an Jiaotong University, Xi'an, P.R.China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060113486"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17648349,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"54","issue":null,"first_page":"0150","last_page":"0155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9664000272750854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7645987272262573},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.721074104309082},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6838722229003906},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.668363630771637},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6609376668930054},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.658785879611969},{"id":"https://openalex.org/keywords/beamforming","display_name":"Beamforming","score":0.5410652160644531},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.524001955986023},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.517732560634613},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5155032277107239},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.5002877712249756},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.48890700936317444},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.46637919545173645},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.44170665740966797},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4406460225582123},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4303649961948395},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.3029845058917999},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2627902925014496},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11507877707481384},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08437129855155945},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07813641428947449}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7645987272262573},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.721074104309082},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6838722229003906},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.668363630771637},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6609376668930054},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.658785879611969},{"id":"https://openalex.org/C54197355","wikidata":"https://www.wikidata.org/wiki/Q5782992","display_name":"Beamforming","level":2,"score":0.5410652160644531},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.524001955986023},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.517732560634613},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5155032277107239},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.5002877712249756},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.48890700936317444},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.46637919545173645},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.44170665740966797},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4406460225582123},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4303649961948395},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.3029845058917999},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2627902925014496},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11507877707481384},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08437129855155945},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07813641428947449},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2018.8650482","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650482","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1975233118","https://openalex.org/W1979833275","https://openalex.org/W1985361072","https://openalex.org/W1986634396","https://openalex.org/W2046307462","https://openalex.org/W2079533137","https://openalex.org/W2088081804","https://openalex.org/W2096151870","https://openalex.org/W2121881701","https://openalex.org/W2129457795","https://openalex.org/W2171006634","https://openalex.org/W2171847598","https://openalex.org/W6679294779"],"related_works":["https://openalex.org/W4391308034","https://openalex.org/W2765236478","https://openalex.org/W3036307543","https://openalex.org/W2290997318","https://openalex.org/W4256489728","https://openalex.org/W2953177019","https://openalex.org/W2013906384","https://openalex.org/W2059799853","https://openalex.org/W1512838724","https://openalex.org/W2799637313"],"abstract_inverted_index":{"In":[0],"this":[1,93],"paper,":[2],"we":[3,105,147],"investigate":[4],"physical-layer":[5],"transmission":[6],"security":[7,152],"problem":[8],"of":[9,16,30,35,157],"a":[10,41,97,125],"two-way":[11],"relay":[12,69],"wireless":[13],"network":[14],"consisting":[15],"two":[17,107,144],"legitimate":[18],"terminal":[19],"nodes":[20,66,75,91,159],"who":[21],"wants":[22],"to":[23,52,76,79,116,137],"communicate":[24],"with":[25,33,124],"each":[26],"other":[27,60],"in":[28,68,92],"presence":[29],"one":[31,49],"eavesdropper,":[32,58],"help":[34],"N":[36,63,89],"intermediate":[37,50,65,90,158],"nodes.":[38],"We":[39],"propose":[40,106,149],"cooperative":[42],"relaying":[43],"and":[44,71],"jamming":[45],"strategy,":[46],"which":[47],"selecting":[48],"node":[51],"create":[53],"intentional":[54],"interference":[55],"upon":[56],"the":[57,73,131,139,143,150,155,164],"while":[59],"K":[61,102],"=":[62],"-1":[64],"operating":[67],"mode":[70],"assisting":[72],"source":[74],"deliver":[77],"data":[78],"their":[80],"corresponding":[81],"destinations":[82],"using":[83],"an":[84],"amplify-and-forward":[85],"(AF)":[86],"protocol.":[87],"All":[88],"system":[94,109],"are":[95],"under":[96],"per-node":[98],"power":[99],"constraint.":[100],"When":[101],"\u2265":[103],"3,":[104],"different":[108],"design":[110],"criteria":[111],"based":[112],"on":[113],"null-space":[114],"beamforming,":[115],"maximize":[117,138],"secrecy":[118,133],"sum":[119,134],"rate":[120,141],"by":[121],"rate-splitting":[122],"method":[123],"bisection":[126],"numerical":[127],"algorithm":[128],"iteratively":[129],"getting":[130],"maximal":[132],"rate,":[135],"or":[136],"minimum":[140],"between":[142],"terminals.":[145],"And":[146],"also":[148],"modified":[151],"schemes":[153,167],"when":[154],"number":[156],"is":[160],"not":[161],"enough":[162],"for":[163],"previously":[165],"mentioned":[166],"(K":[168],"<;":[169],"3).":[170]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
