{"id":"https://openalex.org/W4416286437","doi":"https://doi.org/10.1109/tifs.2025.3633576","title":"Rethinking Secure Resource Allocation: When NOMA Meets Finite Blocklength","display_name":"Rethinking Secure Resource Allocation: When NOMA Meets Finite Blocklength","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416286437","doi":"https://doi.org/10.1109/tifs.2025.3633576"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3633576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3633576","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059353932","display_name":"Junteng Yao","orcid":"https://orcid.org/0009-0005-2390-0487"},"institutions":[{"id":"https://openalex.org/I109935558","display_name":"Ningbo University","ror":"https://ror.org/03et85d35","country_code":"CN","type":"education","lineage":["https://openalex.org/I109935558"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junteng Yao","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China","institution_ids":["https://openalex.org/I109935558"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012672471","display_name":"Ming Jin","orcid":"https://orcid.org/0000-0002-9824-7647"},"institutions":[{"id":"https://openalex.org/I109935558","display_name":"Ningbo University","ror":"https://ror.org/03et85d35","country_code":"CN","type":"education","lineage":["https://openalex.org/I109935558"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Jin","raw_affiliation_strings":["Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering and Computer Science, Ningbo University, Ningbo, China","institution_ids":["https://openalex.org/I109935558"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109070412","display_name":"Te\u2010Kao Wu","orcid":"https://orcid.org/0009-0003-7898-4441"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Tuo Wu","raw_affiliation_strings":["Department of Electronic Engineering, State Key Laboratory of Terahertz and Millimeter Waves, City University of Hong Kong, Kowloon Tong, Hong Kong","Department of Electronic Engineering, State Key Laboratory of Terahertz and Millimeter Waves, City University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, State Key Laboratory of Terahertz and Millimeter Waves, City University of Hong Kong, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Electronic Engineering, State Key Laboratory of Terahertz and Millimeter Waves, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075696071","display_name":"Cunhua Pan","orcid":"https://orcid.org/0000-0001-5286-7958"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cunhua Pan","raw_affiliation_strings":["National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015335741","display_name":"Maged Elkashlan","orcid":"https://orcid.org/0000-0002-5168-0160"},"institutions":[{"id":"https://openalex.org/I166337079","display_name":"Queen Mary University of London","ror":"https://ror.org/026zzn846","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I166337079"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Maged Elkashlan","raw_affiliation_strings":["School of Electronic Engineering and Computer Science, Queen Mary University of London, London, U.K"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering and Computer Science, Queen Mary University of London, London, U.K","institution_ids":["https://openalex.org/I166337079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060020877","display_name":"Chau Yuen","orcid":"https://orcid.org/0000-0002-9307-2120"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Chau Yuen","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore","School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064058830","display_name":"Georgios Karagiannidis","orcid":"https://orcid.org/0000-0001-5420-8286"},"institutions":[{"id":"https://openalex.org/I21370196","display_name":"Aristotle University of Thessaloniki","ror":"https://ror.org/02j61yw88","country_code":"GR","type":"education","lineage":["https://openalex.org/I21370196"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"George K. Karagiannidis","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, Greece","institution_ids":["https://openalex.org/I21370196"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077149719","display_name":"Octavia A. Dobre","orcid":"https://orcid.org/0000-0001-8528-0512"},"institutions":[{"id":"https://openalex.org/I130438778","display_name":"Memorial University of Newfoundland","ror":"https://ror.org/04haebc03","country_code":"CA","type":"education","lineage":["https://openalex.org/I130438778"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Octavia A. Dobre","raw_affiliation_strings":["Faculty of Engineering and Applied Science, Memorial University, St. John&#x2019;s, NL, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Applied Science, Memorial University, St. John&#x2019;s, NL, Canada","institution_ids":["https://openalex.org/I130438778"]}]}],"institutions":[],"countries_distinct_count":6,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5059353932"],"corresponding_institution_ids":["https://openalex.org/I109935558"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.36680697,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"12388","last_page":"12403"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.00279999990016222,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.00039999998989515007,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.628600001335144},{"id":"https://openalex.org/keywords/noma","display_name":"Noma","score":0.5885000228881836},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.48590001463890076},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4722000062465668},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.45249998569488525},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.4462999999523163},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4399000108242035},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.43959999084472656},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.4296000003814697}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.859499990940094},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.628600001335144},{"id":"https://openalex.org/C2775918612","wikidata":"https://www.wikidata.org/wiki/Q994794","display_name":"Noma","level":3,"score":0.5885000228881836},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.48590001463890076},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4722000062465668},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.459199994802475},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.45249998569488525},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4462999999523163},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4399000108242035},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.43959999084472656},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.4296000003814697},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.4099000096321106},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.40700000524520874},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.391400009393692},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3711000084877014},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.3671000003814697},{"id":"https://openalex.org/C83204339","wikidata":"https://www.wikidata.org/wiki/Q7523915","display_name":"Single antenna interference cancellation","level":3,"score":0.366100013256073},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3549000024795532},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34929999709129333},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.2703000009059906},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2703000009059906},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.26089999079704285},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2540000081062317},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2533999979496002},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.25200000405311584}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3633576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3633576","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2106864314","https://openalex.org/W2148622067","https://openalex.org/W2262889796","https://openalex.org/W2605344455","https://openalex.org/W2883007593","https://openalex.org/W2892482188","https://openalex.org/W2908717548","https://openalex.org/W2914649645","https://openalex.org/W2920382960","https://openalex.org/W2945069997","https://openalex.org/W2945328302","https://openalex.org/W2963183582","https://openalex.org/W2963336322","https://openalex.org/W2963829778","https://openalex.org/W2998160334","https://openalex.org/W3007267536","https://openalex.org/W3033821423","https://openalex.org/W3114725839","https://openalex.org/W3151182796","https://openalex.org/W3205377512","https://openalex.org/W3213604789","https://openalex.org/W4206625026","https://openalex.org/W4207001892","https://openalex.org/W4213275211","https://openalex.org/W4288062181","https://openalex.org/W4312324223","https://openalex.org/W4386825182","https://openalex.org/W4388757100","https://openalex.org/W4391559594","https://openalex.org/W4392007310","https://openalex.org/W4392207708","https://openalex.org/W4399118824","https://openalex.org/W4400448573","https://openalex.org/W4401163827","https://openalex.org/W4401387360","https://openalex.org/W4403279372","https://openalex.org/W4404056691","https://openalex.org/W4406856782"],"related_works":[],"abstract_inverted_index":{"The":[0,137],"allocation":[1,216],"of":[2,23,26,81,110,120,153,208],"secure":[3,50,214],"resources":[4],"in":[5,20,123,158,212],"non-orthogonal":[6],"multiple":[7,199],"access":[8,200],"(NOMA)":[9],"systems":[10],"has":[11],"gained":[12],"significant":[13],"recognition":[14],"as":[15,113],"a":[16,49,59,63,66],"vital":[17],"research":[18],"focus":[19],"the":[21,24,33,79,83,90,108,111,116,126,146,150,154,172,185,193,197,206],"realm":[22],"Internet":[25],"Things":[27],"(IoT).":[28],"Previous":[29],"studies":[30],"have":[31],"overlooked":[32],"security":[34],"challenges":[35],"associated":[36],"with":[37,40,78,221],"integrating":[38],"NOMA":[39,52,218],"finite":[41],"blocklength":[42],"(FBL)":[43],"transmission.":[44,223],"Therefore,":[45],"this":[46],"paper":[47],"examines":[48],"downlink":[51],"system":[53],"utilizing":[54],"FBL":[55,222],"transmission,":[56],"which":[57],"includes":[58],"base":[60],"station":[61],"(BS),":[62],"near":[64,84,155],"user,":[65,68,156],"far":[67],"and":[69,97,118,130,178],"an":[70,75,179],"external":[71],"eavesdropper.":[72],"We":[73],"develop":[74],"optimization":[76,114,194],"problem":[77,138,195],"objective":[80],"maximizing":[82],"user\u2019s":[85],"effective":[86,98],"secrecy":[87,91,99,151],"throughput,":[88],"considering":[89],"rates,":[92],"decoding":[93],"error":[94],"probabilities":[95],"(DEPs),":[96],"throughput":[100],"for":[101,149],"both":[102],"users.":[103],"Notably,":[104],"by":[105],"meticulously":[106],"defining":[107],"DEPs":[109,122],"users":[112],"variables,":[115],"monotonicity":[117],"concavity":[119],"these":[121],"relation":[124],"to":[125,191],"blocklength,":[127],"transmission":[128,131],"power,":[129],"rate":[132,152],"can":[133],"be":[134],"established":[135],"effectively.":[136],"is":[139,165,188,219],"divided":[140],"into":[141],"two":[142],"sub-problems":[143,168],"focusing":[144],"on":[145],"essential":[147],"conditions":[148],"especially":[157],"scenarios":[159],"where":[160],"successive":[161],"interference":[162],"cancellation":[163],"(SIC)":[164],"unsuccessful.":[166],"These":[167],"are":[169],"addressed":[170],"using":[171,196],"block":[173],"coordinate":[174],"descent":[175],"(BCD)":[176],"algorithm":[177,187],"exact":[180],"penalty":[181],"method.":[182],"For":[183],"comparison,":[184],"BCD":[186],"also":[189],"applied":[190],"solve":[192],"orthogonal":[198],"(OMA)":[201],"scheme.":[202],"Numerical":[203],"simulations":[204],"confirm":[205],"effectiveness":[207],"our":[209],"proposed":[210],"approaches":[211],"improving":[213],"resource":[215],"when":[217],"combined":[220]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-17T00:00:00"}
