{"id":"https://openalex.org/W2899180896","doi":"https://doi.org/10.1109/tifs.2018.2866327","title":"Secrecy Capacity Region of Fading Binary Z Interference Channel With Statistical CSIT","display_name":"Secrecy Capacity Region of Fading Binary Z Interference Channel With Statistical CSIT","publication_year":2018,"publication_date":"2018-08-21","ids":{"openalex":"https://openalex.org/W2899180896","doi":"https://doi.org/10.1109/tifs.2018.2866327","mag":"2899180896"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2866327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2866327","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014992900","display_name":"Sanjay Karmakar","orcid":"https://orcid.org/0000-0002-0755-2516"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanjay Karmakar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, North Dakota State University, Fargo, ND, USA"],"raw_orcid":"https://orcid.org/0000-0002-0755-2516","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, North Dakota State University, Fargo, ND, USA","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091189014","display_name":"Anirban Ghosh","orcid":"https://orcid.org/0000-0003-1943-9710"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anirban Ghosh","raw_affiliation_strings":["Department of Electrical and Computer Engineering, North Dakota State University, Fargo, ND, USA"],"raw_orcid":"https://orcid.org/0000-0003-1943-9710","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, North Dakota State University, Fargo, ND, USA","institution_ids":["https://openalex.org/I57328836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014992900"],"corresponding_institution_ids":["https://openalex.org/I57328836"],"apc_list":null,"apc_paid":null,"fwci":0.5235,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68710021,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"14","issue":"4","first_page":"848","last_page":"857"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.7903884649276733},{"id":"https://openalex.org/keywords/binary-erasure-channel","display_name":"Binary erasure channel","score":0.7730462551116943},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7349331378936768},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7326542139053345},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.6550294160842896},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.653374433517456},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.6151828765869141},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5448132157325745},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4544903635978699},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4450485110282898},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4339519739151001},{"id":"https://openalex.org/keywords/nakagami-distribution","display_name":"Nakagami distribution","score":0.41921091079711914},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.3587917685508728},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3154416084289551},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2426128387451172},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17868086695671082},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16341063380241394}],"concepts":[{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.7903884649276733},{"id":"https://openalex.org/C149862233","wikidata":"https://www.wikidata.org/wiki/Q864142","display_name":"Binary erasure channel","level":4,"score":0.7730462551116943},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7349331378936768},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7326542139053345},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.6550294160842896},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.653374433517456},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.6151828765869141},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5448132157325745},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4544903635978699},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4450485110282898},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4339519739151001},{"id":"https://openalex.org/C115098869","wikidata":"https://www.wikidata.org/wiki/Q3258347","display_name":"Nakagami distribution","level":4,"score":0.41921091079711914},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.3587917685508728},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3154416084289551},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2426128387451172},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17868086695671082},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16341063380241394},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2018.2866327","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2866327","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1519370757","https://openalex.org/W1547111842","https://openalex.org/W1821528198","https://openalex.org/W1978188352","https://openalex.org/W1979052267","https://openalex.org/W1984264355","https://openalex.org/W1986090422","https://openalex.org/W1990118566","https://openalex.org/W1997167847","https://openalex.org/W2029920391","https://openalex.org/W2030546921","https://openalex.org/W2034027090","https://openalex.org/W2039499262","https://openalex.org/W2041616144","https://openalex.org/W2043769961","https://openalex.org/W2060385240","https://openalex.org/W2096801404","https://openalex.org/W2104667757","https://openalex.org/W2109394932","https://openalex.org/W2109962983","https://openalex.org/W2114677488","https://openalex.org/W2115613211","https://openalex.org/W2122496159","https://openalex.org/W2122716082","https://openalex.org/W2128153585","https://openalex.org/W2129457795","https://openalex.org/W2130334496","https://openalex.org/W2133406100","https://openalex.org/W2143439424","https://openalex.org/W2144007657","https://openalex.org/W2147348113","https://openalex.org/W2148672861","https://openalex.org/W2152949905","https://openalex.org/W2160651961","https://openalex.org/W2294250261","https://openalex.org/W2399786720","https://openalex.org/W2478708596","https://openalex.org/W2498747189","https://openalex.org/W2583019811","https://openalex.org/W2592280048","https://openalex.org/W2622990053","https://openalex.org/W2963454603","https://openalex.org/W3103053992","https://openalex.org/W3104275243","https://openalex.org/W6682960017","https://openalex.org/W6712449169"],"related_works":["https://openalex.org/W2372190485","https://openalex.org/W2139769859","https://openalex.org/W2583282232","https://openalex.org/W2962908977","https://openalex.org/W2140357074","https://openalex.org/W2113562070","https://openalex.org/W2953350338","https://openalex.org/W2810502498","https://openalex.org/W2743670993","https://openalex.org/W2028268383"],"abstract_inverted_index":{"We":[0,53],"characterize":[1,131],"the":[2,18,26,44,50,71,89,105,110,115,121,141,145,150,163,167,176,184],"secrecy":[3,75,106,111,122,169,192],"capacity":[4,58,76,112,123,151],"region":[5,113,124,152],"of":[6,114,137,140,144,153],"a":[7,35,57,62,74,80,126,154,190],"fast":[8,155],"Fading":[9],"Binary":[10],"2-user":[11,159],"Z-Interference":[12],"Channel":[13,20],"(FBZIC),":[14],"assuming":[15],"that":[16,56,120],"only":[17],"Statistical":[19],"State":[21],"Information":[22],"is":[23,31,39,125],"available":[24],"at":[25,70,88,180,189],"Transmitters":[27],"(S-CSIT).":[28],"The":[29],"converse":[30],"proved":[32],"by":[33],"constructing":[34],"new":[36],"channel":[37,66,84],"which":[38],"stochastically":[40],"stronger":[41],"than":[42],"both":[43],"direct":[45],"and":[46,92,128],"cross-links":[47],"emerging":[48],"from":[49],"interfering":[51,90,185],"transmitter.":[52],"also":[54],"show":[55],"optimal":[59,77],"code":[60,78],"for":[61,79],"point-to-point":[63],"binary":[64,81,158],"erasure":[65,82,138],"can":[67,85,95],"be":[68,86,96],"used":[69,87],"non-interfering":[72,177],"transmitter,":[73,91],"wiretap":[83],"received":[93],"signals":[94],"decoded":[97],"treating":[98],"interference":[99],"as":[100],"erasure,":[101],"to":[102,166],"achieve":[103],"all":[104],"rate":[107],"pairs":[108],"within":[109],"FBZIC.":[116],"It":[117],"turns":[118],"out":[119],"trapezoid":[127],"we":[129,161],"explicitly":[130],"its":[132,181],"corner":[133],"points":[134],"in":[135],"terms":[136],"probabilities":[139],"various":[142],"links":[143],"channel.":[146],"Comparing":[147],"it":[148],"with":[149],"fading":[156],"no-secrecy":[157],"ZIC,":[160],"quantify":[162],"loss":[164],"due":[165],"additional":[168],"constraint.":[170],"Our":[171],"results":[172],"reveal":[173],"that,":[174],"when":[175],"user":[178,186],"operates":[179],"maximum":[182],"rate,":[183],"cannot":[187],"operate":[188],"non-zero":[191],"rate.":[193]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
