{"id":"https://openalex.org/W1768919226","doi":"https://doi.org/10.1109/tit.2014.2360683","title":"Cognitive Interference Channels With Confidential Messages Under Randomness Constraint","display_name":"Cognitive Interference Channels With Confidential Messages Under Randomness Constraint","publication_year":2014,"publication_date":"2014-10-17","ids":{"openalex":"https://openalex.org/W1768919226","doi":"https://doi.org/10.1109/tit.2014.2360683","mag":"1768919226"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2014.2360683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2360683","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1204.5663","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045523488","display_name":"Shun Watanabe","orcid":"https://orcid.org/0000-0002-1121-8633"},"institutions":[{"id":"https://openalex.org/I922474255","display_name":"Tokushima University","ror":"https://ror.org/044vy1d05","country_code":"JP","type":"education","lineage":["https://openalex.org/I922474255"]},{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["JP","US"],"is_corresponding":true,"raw_author_name":"Shun Watanabe","raw_affiliation_strings":["Department of Information Science and Intelligent Systems, University of Tokushima, Tokushima, Japan","Institute for Systems Research, University of Maryland, College Park, MD, USA","Dept. of Information Science and Intelligent Systems, University of Tokushima, Tokushima, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Intelligent Systems, University of Tokushima, Tokushima, Japan","institution_ids":["https://openalex.org/I922474255"]},{"raw_affiliation_string":"Institute for Systems Research, University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Dept. of Information Science and Intelligent Systems, University of Tokushima, Tokushima, Japan#TAB#","institution_ids":["https://openalex.org/I922474255"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046860268","display_name":"Yasutada Oohama","orcid":"https://orcid.org/0009-0003-3272-3860"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasutada Oohama","raw_affiliation_strings":["Department of Communication Engineering and Informatics, University of Electro-Communications, Tokyo, Japan","Department of Communication Engineering and Informatics University of Electro-Communications Tokyo Japan"],"affiliations":[{"raw_affiliation_string":"Department of Communication Engineering and Informatics, University of Electro-Communications, Tokyo, Japan","institution_ids":["https://openalex.org/I20529979"]},{"raw_affiliation_string":"Department of Communication Engineering and Informatics University of Electro-Communications Tokyo Japan","institution_ids":["https://openalex.org/I20529979"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045523488"],"corresponding_institution_ids":["https://openalex.org/I66946132","https://openalex.org/I922474255"],"apc_list":null,"apc_paid":null,"fwci":0.4255,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66030115,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"60","issue":"12","first_page":"7698","last_page":"7707"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.869818925857544},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.7513320446014404},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.7180722951889038},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6492811441421509},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5937769412994385},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5782523155212402},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5695227384567261},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5204637050628662},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.5148688554763794},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.4824024438858032},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45984092354774475},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4563201069831848},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3583892583847046},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1406841278076172},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07803472876548767}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.869818925857544},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.7513320446014404},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.7180722951889038},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6492811441421509},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5937769412994385},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5782523155212402},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5695227384567261},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5204637050628662},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.5148688554763794},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.4824024438858032},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45984092354774475},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4563201069831848},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3583892583847046},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1406841278076172},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07803472876548767},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/tit.2014.2360683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2014.2360683","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1204.5663","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1204.5663","pdf_url":"https://arxiv.org/pdf/1204.5663","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:1768919226","is_oa":true,"landing_page_url":"http://arxiv.org/pdf/1204.5663.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1204.5663","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1204.5663","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"mag:2963171103","is_oa":false,"landing_page_url":"http://dblp.uni-trier.de/db/conf/isita/isita2012.html#WatanabeO12","pdf_url":null,"source":{"id":"https://openalex.org/S4306420161","display_name":"International Symposium on Information Theory and its Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"International Symposium on Information Theory and its Applications","raw_type":null}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1204.5663","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1204.5663","pdf_url":"https://arxiv.org/pdf/1204.5663","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1514518704","https://openalex.org/W2039499262","https://openalex.org/W2043769961","https://openalex.org/W2068887604","https://openalex.org/W2079364662","https://openalex.org/W2095973875","https://openalex.org/W2102617152","https://openalex.org/W2103674915","https://openalex.org/W2111668044","https://openalex.org/W2117654872","https://openalex.org/W2119007567","https://openalex.org/W2133601891","https://openalex.org/W2134841917","https://openalex.org/W2135536003","https://openalex.org/W2144007657","https://openalex.org/W2148587342","https://openalex.org/W2162635854","https://openalex.org/W2179880807","https://openalex.org/W2951773775","https://openalex.org/W2953269090","https://openalex.org/W4300840296","https://openalex.org/W6682468974","https://openalex.org/W6764764806"],"related_works":["https://openalex.org/W2963171103","https://openalex.org/W2133601891","https://openalex.org/W2085505461","https://openalex.org/W2765992279","https://openalex.org/W2096037147","https://openalex.org/W2963094202","https://openalex.org/W3046262499","https://openalex.org/W2156445794","https://openalex.org/W2156048500","https://openalex.org/W2220794438","https://openalex.org/W1561168146","https://openalex.org/W2140629795","https://openalex.org/W1508632613","https://openalex.org/W2083507154","https://openalex.org/W2090677047","https://openalex.org/W2114846147","https://openalex.org/W2134169741","https://openalex.org/W2907997730","https://openalex.org/W2028826208","https://openalex.org/W2023257215"],"abstract_inverted_index":{"The":[0],"cognitive":[1],"interference":[2],"channel":[3],"with":[4],"confidential":[5,44],"messages":[6],"(CICC)":[7],"proposed":[8],"by":[9],"Liang":[10],"<italic":[11],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[12],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">et":[13],"al.</i>":[14],"is":[15,20,26,73,79],"investigated.":[16],"When":[17],"the":[18,29,39,42,53,55,58,61,66,70,76],"security":[19],"considered":[21],"in":[22],"coding":[23],"systems,":[24],"it":[25],"well-known":[27],"that":[28],"sender":[30],"needs":[31],"to":[32,37,46,49,64],"use":[33],"a":[34],"stochastic":[35,67],"encoding":[36,68],"avoid":[38],"information":[40],"about":[41],"transmitted":[43],"message":[45],"be":[47],"leaked":[48],"an":[50],"eavesdropper.":[51],"For":[52],"CICC,":[54],"tradeoff":[56,78],"between":[57],"rate":[59],"of":[60],"random":[62],"number":[63],"realize":[65],"and":[69,75],"communication":[71],"rates":[72],"investigated,":[74],"optimal":[77],"completely":[80],"characterized.":[81]},"counts_by_year":[{"year":2014,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
