{"id":"https://openalex.org/W4293243591","doi":"https://doi.org/10.1109/tifs.2022.3197062","title":"Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis","display_name":"Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4293243591","doi":"https://doi.org/10.1109/tifs.2022.3197062"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3197062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3197062","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101740553","display_name":"Shaobo Jia","orcid":"https://orcid.org/0000-0002-3139-6699"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shaobo Jia","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou, China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067509102","display_name":"Jiankang Zhang","orcid":"https://orcid.org/0000-0001-5316-1711"},"institutions":[{"id":"https://openalex.org/I9300472","display_name":"Bournemouth University","ror":"https://ror.org/05wwcw481","country_code":"GB","type":"education","lineage":["https://openalex.org/I9300472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jiankang Zhang","raw_affiliation_strings":["Department of Computing and Informatics, Bournemouth University, Bournemouth, U.K","Department of Computing &#x0026"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Informatics, Bournemouth University, Bournemouth, U.K","institution_ids":["https://openalex.org/I9300472"]},{"raw_affiliation_string":"Department of Computing &#x0026","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100320969","display_name":"Sheng Chen","orcid":"https://orcid.org/0000-0001-6882-600X"},"institutions":[{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sheng Chen","raw_affiliation_strings":["School of Electronics and Computer Science, University of Southampton, Southampton, U.K"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Computer Science, University of Southampton, Southampton, U.K","institution_ids":["https://openalex.org/I43439940"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036919829","display_name":"Wanming Hao","orcid":"https://orcid.org/0000-0002-4465-3447"},"institutions":[{"id":"https://openalex.org/I38877650","display_name":"Zhengzhou University","ror":"https://ror.org/04ypx8c21","country_code":"CN","type":"education","lineage":["https://openalex.org/I38877650"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanming Hao","raw_affiliation_strings":["School of Information Engineering, Zhengzhou University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Zhengzhou University, Zhengzhou, China","institution_ids":["https://openalex.org/I38877650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013867024","display_name":"Wei Xu","orcid":"https://orcid.org/0000-0001-9341-8382"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Xu","raw_affiliation_strings":["National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101740553"],"corresponding_institution_ids":["https://openalex.org/I38877650"],"apc_list":null,"apc_paid":null,"fwci":0.8312,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.71216744,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"17","issue":null,"first_page":"2906","last_page":"2919"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7732748985290527},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.7329298257827759},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6497398614883423},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5737031102180481},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.5405231714248657},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.46784457564353943},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.45523667335510254},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.39608025550842285},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3860475718975067},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22901785373687744},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1799127757549286},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17130079865455627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08553948998451233}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7732748985290527},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.7329298257827759},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6497398614883423},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5737031102180481},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.5405231714248657},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.46784457564353943},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.45523667335510254},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.39608025550842285},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3860475718975067},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22901785373687744},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1799127757549286},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17130079865455627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08553948998451233},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2022.3197062","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3197062","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:eprints.bournemouth.ac.uk:37294","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400187","display_name":"Bournemouth University Research Online (Bournemouth University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9300472","host_organization_name":"Bournemouth University","host_organization_lineage":["https://openalex.org/I9300472"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:eprints.soton.ac.uk:468945","is_oa":false,"landing_page_url":"http://doi.org/10.1109/TIFS.2022.3197062>).","pdf_url":null,"source":{"id":"https://openalex.org/S4306401019","display_name":"ePrints Soton (University of Southampton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I43439940","host_organization_name":"University of Southampton","host_organization_lineage":["https://openalex.org/I43439940"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.550000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2762992914","display_name":null,"funder_award_id":"222102210097","funder_id":"https://openalex.org/F4320336593","funder_display_name":"Henan Provincial Science and Technology Research Project"}],"funders":[{"id":"https://openalex.org/F4320336593","display_name":"Henan Provincial Science and Technology Research Project","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1972485395","https://openalex.org/W1977283868","https://openalex.org/W1996441276","https://openalex.org/W2000911299","https://openalex.org/W2007529001","https://openalex.org/W2043769961","https://openalex.org/W2048752596","https://openalex.org/W2080693943","https://openalex.org/W2101176848","https://openalex.org/W2103063389","https://openalex.org/W2110019315","https://openalex.org/W2113706820","https://openalex.org/W2128153585","https://openalex.org/W2135137654","https://openalex.org/W2141797073","https://openalex.org/W2156214717","https://openalex.org/W2159687282","https://openalex.org/W2184413915","https://openalex.org/W2248823781","https://openalex.org/W2330857137","https://openalex.org/W2531931725","https://openalex.org/W2593419552","https://openalex.org/W2607352806","https://openalex.org/W2752221828","https://openalex.org/W2789503661","https://openalex.org/W2790990878","https://openalex.org/W2945534522","https://openalex.org/W2950680381","https://openalex.org/W2962683633","https://openalex.org/W2963647306","https://openalex.org/W2975790550","https://openalex.org/W2981465242","https://openalex.org/W2991732183","https://openalex.org/W3045295509","https://openalex.org/W3105416149","https://openalex.org/W3131336713","https://openalex.org/W3208940722"],"related_works":["https://openalex.org/W2765236478","https://openalex.org/W4391308034","https://openalex.org/W2951619176","https://openalex.org/W4360996312","https://openalex.org/W2529506699","https://openalex.org/W4390240227","https://openalex.org/W3036307543","https://openalex.org/W2290997318","https://openalex.org/W4237311310","https://openalex.org/W4256489728"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,13,20,31,48,53,57,71,76,89,96,99,125,131,146,155,169,182,187],"power":[4,28,34,40,59,65,78,101,114],"allocation":[5,29,35,41,66,102],"problem":[6],"for":[7,70,107,130],"secure":[8],"multiple-input":[9],"single-output":[10],"transmission":[11],"with":[12,145,190],"injection":[14],"of":[15,22,52,98,179],"artificial":[16],"noise":[17,58,77,113],"(AN),":[18],"in":[19,74],"presence":[21],"an":[23],"unknown":[24],"eavesdropper":[25],"(Eve).":[26],"Two":[27],"schemes,":[30,43,103],"optimal":[32],"adaptive":[33],"(OAPA)":[36],"and":[37,134,139],"suboptimal":[38],"fixed":[39],"(SFPA)":[42],"are":[44,68,116],"proposed":[45,100,132,156],"to":[46,83,87],"enhance":[47],"physical":[49],"layer":[50],"security":[51],"considered":[54],"system.":[55],"Since":[56],"at":[60,79],"Eve":[61,80],"is":[62,81,177],"unknown,":[63],"both":[64],"schemes":[67],"designed":[69],"worst-case":[72,126,184],"scenario":[73],"which":[75],"assumed":[82],"be":[84],"zero,":[85],"aiming":[86],"minimize":[88],"secrecy":[90,127,161],"outage":[91,128,162],"probability":[92],"(SOP).":[93],"To":[94],"characterize":[95],"performance":[97,129,163],"approximate":[104],"closed-form":[105],"expressions":[106],"average":[108],"SOP":[109,185],"under":[110],"a":[111,191],"preset":[112],"level":[115],"derived":[117],"by":[118],"applying":[119],"Gauss-Chebyshev":[120],"quadrature.":[121],"We":[122],"also":[123,172],"address":[124],"OAPA":[133,157,188],"SFPA":[135,170],"schemes.":[136],"Our":[137],"analytical":[138],"numerical":[140],"results":[141],"show":[142],"that,":[143],"compared":[144],"exhaustive":[147],"search":[148],"method":[149],"that":[150],"requires":[151],"Eve&#x2019;s":[152,165,174],"prior":[153,166,175],"information,":[154,176],"scheme":[158],"exhibits":[159],"comparable":[160],"without":[164,173],"information.":[167],"Additionally,":[168],"scheme,":[171,189],"capable":[178],"achieving":[180],"almost":[181],"same":[183],"as":[186],"much":[192],"lower":[193],"implementation":[194],"complexity.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
