{"id":"https://openalex.org/W4394811191","doi":"https://doi.org/10.1109/tifs.2024.3389569","title":"RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation","display_name":"RIS-Jamming: Breaking Key Consistency in Channel Reciprocity-Based Key Generation","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4394811191","doi":"https://doi.org/10.1109/tifs.2024.3389569"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3389569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3389569","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013730149","display_name":"Guyue Li","orcid":"https://orcid.org/0000-0003-1145-1168"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]},{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guyue Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063239561","display_name":"Paul Staat","orcid":"https://orcid.org/0000-0002-7539-4847"},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Paul Staat","raw_affiliation_strings":["Max Planck Institute for Security and Privacy, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Max Planck Institute for Security and Privacy, Bochum, Germany","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100358580","display_name":"Haoyu Li","orcid":"https://orcid.org/0009-0004-7555-2093"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyu Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067393592","display_name":"Markus Heinrichs","orcid":"https://orcid.org/0000-0001-9557-1460"},"institutions":[{"id":"https://openalex.org/I102520234","display_name":"TH K\u00f6ln - University of Applied Sciences","ror":"https://ror.org/014nnvj65","country_code":"DE","type":"education","lineage":["https://openalex.org/I102520234"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Markus Heinrichs","raw_affiliation_strings":["High Frequency Laboratory, TH Koln&#x2014;University of Applied Sciences, Cologne, Germany"],"affiliations":[{"raw_affiliation_string":"High Frequency Laboratory, TH Koln&#x2014;University of Applied Sciences, Cologne, Germany","institution_ids":["https://openalex.org/I102520234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030110336","display_name":"Christian Zenger","orcid":"https://orcid.org/0000-0003-1638-948X"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christian Zenger","raw_affiliation_strings":["PHYSEC GmbH, Bochum, Germany","Ruhr University Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"PHYSEC GmbH, Bochum, Germany","institution_ids":[]},{"raw_affiliation_string":"Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027585399","display_name":"Rainer Kronberger","orcid":"https://orcid.org/0000-0001-6765-922X"},"institutions":[{"id":"https://openalex.org/I102520234","display_name":"TH K\u00f6ln - University of Applied Sciences","ror":"https://ror.org/014nnvj65","country_code":"DE","type":"education","lineage":["https://openalex.org/I102520234"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Rainer Kronberger","raw_affiliation_strings":["Faculty of Information, Media and Electrical Engineering, TH Koln&#x2014;University of Applied Sciences, Cologne, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Information, Media and Electrical Engineering, TH Koln&#x2014;University of Applied Sciences, Cologne, Germany","institution_ids":["https://openalex.org/I102520234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060485788","display_name":"H. Elders\u2013Boll","orcid":"https://orcid.org/0000-0003-4397-7113"},"institutions":[{"id":"https://openalex.org/I102520234","display_name":"TH K\u00f6ln - University of Applied Sciences","ror":"https://ror.org/014nnvj65","country_code":"DE","type":"education","lineage":["https://openalex.org/I102520234"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Harald Elders-Boll","raw_affiliation_strings":["Faculty of Information, Media and Electrical Engineering, TH Koln&#x2014;University of Applied Sciences, Cologne, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Information, Media and Electrical Engineering, TH Koln&#x2014;University of Applied Sciences, Cologne, Germany","institution_ids":["https://openalex.org/I102520234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041748332","display_name":"Christof Paar","orcid":"https://orcid.org/0000-0001-8681-2277"},"institutions":[{"id":"https://openalex.org/I4210096592","display_name":"Max Planck Institute for Security and Privacy","ror":"https://ror.org/00bj0r217","country_code":"DE","type":"facility","lineage":["https://openalex.org/I149899117","https://openalex.org/I4210096592"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN","DE"],"is_corresponding":false,"raw_author_name":"Christof Paar","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","Max Planck Institute for Security and Privacy, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"Max Planck Institute for Security and Privacy, Bochum, Germany","institution_ids":["https://openalex.org/I4210096592"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075678549","display_name":"Aiqun Hu","orcid":"https://orcid.org/0000-0002-0398-4899"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aiqun Hu","raw_affiliation_strings":["Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5013730149"],"corresponding_institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":4.2498,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.94692518,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"5090","last_page":"5105"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12989","display_name":"Ocular Disorders and Treatments","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7934901714324951},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7839852571487427},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5961126685142517},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5924296379089355},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5729852914810181},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5623159408569336},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5347926020622253},{"id":"https://openalex.org/keywords/multipath-propagation","display_name":"Multipath propagation","score":0.5258746147155762},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.4951256811618805},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4949278235435486},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.46709057688713074},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43006810545921326},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4273456037044525},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.4179666340351105},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22518455982208252},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10484486818313599}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7934901714324951},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7839852571487427},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5961126685142517},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5924296379089355},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5729852914810181},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5623159408569336},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5347926020622253},{"id":"https://openalex.org/C161218011","wikidata":"https://www.wikidata.org/wiki/Q11827794","display_name":"Multipath propagation","level":3,"score":0.5258746147155762},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.4951256811618805},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4949278235435486},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.46709057688713074},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43006810545921326},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4273456037044525},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.4179666340351105},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22518455982208252},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10484486818313599},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3389569","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3389569","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G601026658","display_name":null,"funder_award_id":"62171121","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8014458112","display_name":null,"funder_award_id":"2022YFB2902202","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8853341699","display_name":null,"funder_award_id":"U22A2001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1513610530","https://openalex.org/W1919042217","https://openalex.org/W1958735522","https://openalex.org/W2010820924","https://openalex.org/W2054496355","https://openalex.org/W2064081294","https://openalex.org/W2079657735","https://openalex.org/W2102187818","https://openalex.org/W2106833918","https://openalex.org/W2124952412","https://openalex.org/W2293482595","https://openalex.org/W2328543229","https://openalex.org/W2503032247","https://openalex.org/W2624411278","https://openalex.org/W2689804633","https://openalex.org/W2789415212","https://openalex.org/W2950090335","https://openalex.org/W2962792006","https://openalex.org/W2984937369","https://openalex.org/W3020735853","https://openalex.org/W3035437586","https://openalex.org/W3041569330","https://openalex.org/W3043220753","https://openalex.org/W3045385301","https://openalex.org/W3049088677","https://openalex.org/W3104300639","https://openalex.org/W3108962068","https://openalex.org/W3114262415","https://openalex.org/W3121047872","https://openalex.org/W3131368335","https://openalex.org/W3132465714","https://openalex.org/W3153459532","https://openalex.org/W3168309215","https://openalex.org/W3173937035","https://openalex.org/W3188997848","https://openalex.org/W3205889206","https://openalex.org/W3209252509","https://openalex.org/W4200633554","https://openalex.org/W4206016832","https://openalex.org/W4210540330","https://openalex.org/W4226330150","https://openalex.org/W4239066252","https://openalex.org/W4280490829","https://openalex.org/W4281386777","https://openalex.org/W4286656242","https://openalex.org/W4303441398","https://openalex.org/W4313001863","https://openalex.org/W4375928703","https://openalex.org/W4385338749","https://openalex.org/W6739959356","https://openalex.org/W6775685436","https://openalex.org/W6846222854"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W3034924094","https://openalex.org/W3094954546","https://openalex.org/W1488708774","https://openalex.org/W2906312651","https://openalex.org/W4280526795"],"abstract_inverted_index":{"Channel":[0],"Reciprocity-based":[1],"Key":[2],"Generation":[3],"(CRKG)":[4],"exploits":[5,126],"reciprocal":[6],"channel":[7,71,141],"randomness":[8,238],"to":[9,23,69,79,111,149,170,203,225],"establish":[10],"shared":[11],"secret":[12,29,105,172,213],"keys":[13,173,214],"between":[14],"wireless":[15,34],"terminals.":[16],"This":[17],"new":[18,42],"security":[19],"technique":[20],"is":[21,99,136,147],"expected":[22],"complement":[24],"existing":[25],"cryptographic":[26],"techniques":[27],"for":[28,129],"key":[30,63,106],"distribution":[31],"of":[32,114,211,237],"future":[33],"networks.":[35],"In":[36,197],"this":[37],"paper,":[38],"we":[39,74,121,200,218],"present":[40,157],"a":[41,66,109,123,193],"attack,":[43],"reconfigurable":[44],"intelligent":[45],"surface":[46],"(RIS)":[47],"jamming,":[48],"and":[49,91,143,239],"show":[50],"that":[51,125,161],"an":[52],"attacker":[53],"can":[54],"prevent":[55],"legitimate":[56,162],"users":[57,163],"from":[58,138,174],"agreeing":[59],"on":[60,76],"the":[61,81,93,104,112,145,175,182,205,221,235,240],"same":[62],"by":[64,102,185,215],"deploying":[65],"malicious":[67,133],"RIS":[68,134,165,195,227,241],"break":[70],"reciprocity.":[72],"Specifically,":[73],"elaborate":[75],"three":[77],"examples":[78],"implement":[80],"RIS-jamming":[82,119,183],"attack:":[83],"Using":[84],"active":[85],"nonreciprocal":[86],"circuits,":[87],"performing":[88],"time-varying":[89],"controls,":[90],"reducing":[92],"signal-to-noise":[94],"ratio.":[95],"The":[96,132],"attack":[97,184],"effect":[98],"then":[100],"studied":[101],"formulating":[103],"rate":[107],"with":[108,192],"relationship":[110],"deployment":[113],"RIS.":[115],"To":[116],"resist":[117],"such":[118],"attacks,":[120],"propose":[122],"countermeasure":[124,146,224],"wideband":[127,230],"signals":[128],"multipath":[130],"separation.":[131],"path":[135,152],"distinguished":[137],"all":[139],"separated":[140],"paths,":[142],"thus":[144],"referred":[148],"as":[150,232,234],"contaminated":[151],"removal-based":[153],"CRKG":[154],"(CPR-CRKG).":[155],"We":[156,178],"simulation":[158],"results,":[159],"showing":[160],"under":[164],"jamming":[166,228],"are":[167,244],"still":[168],"able":[169,202],"generate":[171],"remaining":[176],"paths.":[177],"also":[179],"experimentally":[180],"demonstrate":[181,220],"using":[186],"commodity":[187],"Wi-Fi":[188],"devices":[189],"in":[190,229],"conjunction":[191],"fabricated":[194],"prototype.":[196],"our":[198],"experiments,":[199],"were":[201],"increase":[204],"average":[206],"bit":[207],"disagreement":[208],"ratio":[209],"(BDR)":[210],"raw":[212],"20%.":[216],"Further,":[217],"successfully":[219],"proposed":[222],"CPR-CRKG":[223],"tackle":[226],"systems":[231],"long":[233],"source":[236],"propagation":[242],"paths":[243],"separable.":[245]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
