{"id":"https://openalex.org/W2056418000","doi":"https://doi.org/10.1109/tifs.2013.2278936","title":"Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT","display_name":"Secure Degrees of Freedom of MIMO X-Channels With Output Feedback and Delayed CSIT","publication_year":2013,"publication_date":"2013-08-16","ids":{"openalex":"https://openalex.org/W2056418000","doi":"https://doi.org/10.1109/tifs.2013.2278936","mag":"2056418000"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2013.2278936","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2278936","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1309.4026","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014906072","display_name":"Abdellatif Zaidi","orcid":"https://orcid.org/0000-0003-2023-9476"},"institutions":[{"id":"https://openalex.org/I2800365227","display_name":"Paris-Est Sup","ror":"https://ror.org/0268ecp52","country_code":"FR","type":"education","lineage":["https://openalex.org/I2800365227"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Abdellatif Zaidi","raw_affiliation_strings":["Universit\u00e9 Paris-Est, Marne-la-Vallee, France","Univ. Paris-EstMarne-la-Vallee, Marne-la-Valle\u0301e, France"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Paris-Est, Marne-la-Vallee, France","institution_ids":["https://openalex.org/I2800365227"]},{"raw_affiliation_string":"Univ. Paris-EstMarne-la-Vallee, Marne-la-Valle\u0301e, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037458436","display_name":"Zohaib Hassan Awan","orcid":"https://orcid.org/0000-0003-3357-6455"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Zohaib Hassan Awan","raw_affiliation_strings":["Universite catholique de Louvain, Louvain-la-Neuve, BE","ICTEAM Inst., Univ. Catholique de Louvain, Louvain la Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"Universite catholique de Louvain, Louvain-la-Neuve, BE","institution_ids":["https://openalex.org/I95674353"]},{"raw_affiliation_string":"ICTEAM Inst., Univ. Catholique de Louvain, Louvain la Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025989795","display_name":"Shlomo Shamai","orcid":"https://orcid.org/0000-0002-6594-3371"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Shlomo Shamai","raw_affiliation_strings":["Department of Electrical Engineering, Technion Institute of Technology, Haifa, Israel","Dept. of Electr.Eng., Technion-Israel Inst. of Technol., Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Technion Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]},{"raw_affiliation_string":"Dept. of Electr.Eng., Technion-Israel Inst. of Technol., Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000909128","display_name":"Luc Vandendorpe","orcid":"https://orcid.org/0000-0003-4958-8848"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Luc Vandendorpe","raw_affiliation_strings":["ICTEAM Institute (\u00c9cole Polytechnique de Louvain), Universit\u00e9 Catholique de Louvain, Louvain-la-Neuve, Belgium","ICTEAM Inst., Univ. Catholique de Louvain, Louvain la Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"ICTEAM Institute (\u00c9cole Polytechnique de Louvain), Universit\u00e9 Catholique de Louvain, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]},{"raw_affiliation_string":"ICTEAM Inst., Univ. Catholique de Louvain, Louvain la Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014906072"],"corresponding_institution_ids":["https://openalex.org/I2800365227"],"apc_list":null,"apc_paid":null,"fwci":5.2852,"has_fulltext":false,"cited_by_count":49,"citation_normalized_percentile":{"value":0.95906197,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"11","first_page":"1760","last_page":"1774"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.8865377902984619},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.841795802116394},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.7516720294952393},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6250039339065552},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.6195456981658936},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5819127559661865},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.545341968536377},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4933151304721832},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.44475528597831726},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.31529706716537476},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.25476112961769104},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.18061745166778564},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.06633290648460388}],"concepts":[{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.8865377902984619},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.841795802116394},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.7516720294952393},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6250039339065552},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.6195456981658936},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5819127559661865},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.545341968536377},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4933151304721832},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.44475528597831726},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.31529706716537476},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.25476112961769104},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.18061745166778564},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.06633290648460388},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tifs.2013.2278936","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2013.2278936","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1309.4026","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1309.4026","pdf_url":"https://arxiv.org/pdf/1309.4026","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:HAL:hal-00856865v1","is_oa":true,"landing_page_url":"https://hal.science/hal-00856865","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, 2013, 8 (114), pp.1760-1774. &#x27E8;10.1109/TIFS.2013.2278936&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:dial.uclouvain.be:boreal:134246","is_oa":false,"landing_page_url":"http://hdl.handle.net/2078.1/134246","pdf_url":null,"source":{"id":"https://openalex.org/S4306401974","display_name":"DIAL (Catholic University of Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, Vol. 11, no.8, p. 1760-1774 (Nov.)","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1309.4026","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1309.4026","pdf_url":"https://arxiv.org/pdf/1309.4026","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8299999833106995}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1671267042","https://openalex.org/W1681985504","https://openalex.org/W1775180555","https://openalex.org/W2002469179","https://openalex.org/W2010213837","https://openalex.org/W2010645529","https://openalex.org/W2030549587","https://openalex.org/W2042349622","https://openalex.org/W2043769961","https://openalex.org/W2057450804","https://openalex.org/W2060385240","https://openalex.org/W2072563372","https://openalex.org/W2079364662","https://openalex.org/W2096037147","https://openalex.org/W2101726439","https://openalex.org/W2104208229","https://openalex.org/W2104562009","https://openalex.org/W2106549261","https://openalex.org/W2106697356","https://openalex.org/W2108438541","https://openalex.org/W2108536000","https://openalex.org/W2111772171","https://openalex.org/W2112081641","https://openalex.org/W2113817460","https://openalex.org/W2115613211","https://openalex.org/W2124982134","https://openalex.org/W2129457795","https://openalex.org/W2133406100","https://openalex.org/W2134058074","https://openalex.org/W2135638594","https://openalex.org/W2142102521","https://openalex.org/W2143397453","https://openalex.org/W2144007657","https://openalex.org/W2147348113","https://openalex.org/W2152949905","https://openalex.org/W2158756365","https://openalex.org/W2161443611","https://openalex.org/W2170733622","https://openalex.org/W2536169641","https://openalex.org/W2620656463","https://openalex.org/W2949205648","https://openalex.org/W2949420488","https://openalex.org/W2949738325","https://openalex.org/W2949902836","https://openalex.org/W2951724295","https://openalex.org/W2953293975","https://openalex.org/W3105854486","https://openalex.org/W3125864775","https://openalex.org/W4205417298","https://openalex.org/W4293702014","https://openalex.org/W6728900288"],"related_works":["https://openalex.org/W2059045613","https://openalex.org/W4250215096","https://openalex.org/W2119209917","https://openalex.org/W884630482","https://openalex.org/W2145047504","https://openalex.org/W2159179523","https://openalex.org/W2025723618","https://openalex.org/W2552025594","https://openalex.org/W4211013851","https://openalex.org/W1558892308"],"abstract_inverted_index":{"We":[0,40,93,206,306],"investigate":[1],"the":[2,64,84,97,106,111,115,118,130,165,169,186,209,220,231,243,256,264,270,281,284,296],"problem":[3],"of":[4,89,99,110,121,146,160,168,269,287],"secure":[5,87],"transmission":[6],"over":[7],"a":[8,37,122,190,227,288],"two-user":[9,123,289],"multi-input":[10],"multi-output":[11],"(MIMO)":[12],"X-channel":[13,47,113,272],"in":[14,96,158,189,211,245],"which":[15,212,246],"channel":[16,34],"state":[17],"information":[18],"is":[19,114,154,183,217,280],"provided":[20,218],"with":[21,48,59,68,126,258,273,292,310],"one-unit":[22],"delay":[23],"to":[24,36,42,164,185,200,219,242,255],"both":[25,77,201],"transmitters":[26,56,202],"(CSIT),":[27],"and":[28,52,63,103,137,150,203,225,277,303],"each":[29,80,135,194,301],"receiver":[30,195],"feeds":[31,196],"back":[32,197],"its":[33,198],"output":[35,50,101,148,181,199,215,275],"different":[38],"transmitter.":[39],"refer":[41],"this":[43,73,175,235],"model":[44],"as":[45,117,283],"MIMO":[46,112,124,290],"asymmetric":[49,100,147,214,274],"feedback":[51,102,149,182,216,276],"delayed":[53,104,138,151,278,304],"CSIT.":[54,139,205,305],"The":[55],"are":[57,66,248],"equipped":[58,67],"M":[60],"antennas":[61,70,128,133,294,299],"each,":[62],"receivers":[65],"N":[69,132,298],"each.":[71],"For":[72],"model,":[74],"accounting":[75],"for":[76,234],"messages":[78],"at":[79,129,134,295,300],"receiver,":[81,136,302],"we":[82,172,238,261],"characterize":[83],"optimal":[85,265],"sum":[86,107,161,232,266],"degrees":[88],"freedom":[90],"(SDoF)":[91],"region.":[92],"show":[94,173,262],"that,":[95,143],"presence":[98],"CSIT,":[105,152,224],"SDoF":[108,119,162,233],"region":[109,120,268,286],"same":[116,282],"BC":[125,291],"2M":[127,293],"transmitter,":[131,297],"This":[140],"result":[141,176],"shows":[142],"upon":[144],"availability":[145],"there":[153,247],"no":[155,204,249],"performance":[156],"loss":[157],"terms":[159],"due":[163],"distributed":[166],"nature":[167],"transmitters.":[170],"Next,":[171],"that":[174,263],"also":[177,207],"holds":[178],"if":[179],"only":[180,213],"conveyed":[184],"transmitters,":[187,221],"but":[188],"symmetric":[191],"manner,":[192],"i.e.,":[193,222],"study":[208],"case":[210,244],"without":[223],"derive":[226],"lower":[228],"bound":[229],"on":[230],"model.":[236],"Furthermore,":[237],"specialize":[239],"our":[240,308],"results":[241,309],"security":[250,259],"constraints.":[251],"In":[252],"particular,":[253],"similar":[254],"setting":[257],"constraints,":[260],"DoF":[267,285],"(M,M,N,N)-MIMO":[271],"CSIT":[279],"illustrate":[307],"some":[311],"numerical":[312],"examples.":[313]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
