{"id":"https://openalex.org/W2026537412","doi":"https://doi.org/10.1109/tsp.2012.2235433","title":"Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks","display_name":"Deaf Cooperation and Relay Selection Strategies for Secure Communication in Multiple Relay Networks","publication_year":2012,"publication_date":"2012-12-19","ids":{"openalex":"https://openalex.org/W2026537412","doi":"https://doi.org/10.1109/tsp.2012.2235433","mag":"2026537412"},"language":"en","primary_location":{"id":"doi:10.1109/tsp.2012.2235433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp.2012.2235433","pdf_url":null,"source":{"id":"https://openalex.org/S168680287","display_name":"IEEE Transactions on Signal Processing","issn_l":"1053-587X","issn":["1053-587X","1941-0476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Signal Processing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009609755","display_name":"Raef Bassily","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]},{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Raef Bassily","raw_affiliation_strings":["Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA","Department of Electrical and Computer Engineering, University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021132487","display_name":"\u015eennur Uluku\u015f","orcid":"https://orcid.org/0000-0002-8219-8190"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sennur Ulukus","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009609755"],"corresponding_institution_ids":["https://openalex.org/I130769515","https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":6.9902,"has_fulltext":false,"cited_by_count":57,"citation_normalized_percentile":{"value":0.97271614,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"61","issue":"6","first_page":"1544","last_page":"1554"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7974709272384644},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.7341355085372925},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6518125534057617},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6296311616897583},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5598005652427673},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5115073919296265},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5020878314971924},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4939890503883362},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.48347097635269165},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.47881418466567993},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.43876075744628906},{"id":"https://openalex.org/keywords/code-word","display_name":"Code word","score":0.42961585521698},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.42280346155166626},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3610091805458069},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3593749403953552},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.35772615671157837},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27227258682250977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2604218125343323},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.24806424975395203},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22956103086471558},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.22832635045051575},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.2179032266139984},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10423609614372253},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.09579730033874512}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7974709272384644},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.7341355085372925},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6518125534057617},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6296311616897583},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5598005652427673},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5115073919296265},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5020878314971924},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4939890503883362},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.48347097635269165},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.47881418466567993},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.43876075744628906},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.42961585521698},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.42280346155166626},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3610091805458069},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3593749403953552},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.35772615671157837},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27227258682250977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2604218125343323},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.24806424975395203},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22956103086471558},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.22832635045051575},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.2179032266139984},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10423609614372253},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.09579730033874512},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tsp.2012.2235433","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsp.2012.2235433","pdf_url":null,"source":{"id":"https://openalex.org/S168680287","display_name":"IEEE Transactions on Signal Processing","issn_l":"1053-587X","issn":["1053-587X","1941-0476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Signal Processing","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.299.7045","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.7045","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ece.umd.edu/~ulukus/papers/journal/deaf-coop-relay-network.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W52732363","https://openalex.org/W1819333753","https://openalex.org/W1979833275","https://openalex.org/W1986064547","https://openalex.org/W1987034598","https://openalex.org/W1998410277","https://openalex.org/W1999384767","https://openalex.org/W2043769961","https://openalex.org/W2111142436","https://openalex.org/W2115613211","https://openalex.org/W2116892602","https://openalex.org/W2120073444","https://openalex.org/W2123658733","https://openalex.org/W2127763778","https://openalex.org/W2128153585","https://openalex.org/W2129457795","https://openalex.org/W2135332407","https://openalex.org/W2141168001","https://openalex.org/W2142102521","https://openalex.org/W2151633982","https://openalex.org/W2167165277","https://openalex.org/W2963852371","https://openalex.org/W3155313539","https://openalex.org/W6638447810","https://openalex.org/W6650456257"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2951619176","https://openalex.org/W1983377825","https://openalex.org/W2552932238","https://openalex.org/W3149637150","https://openalex.org/W2786427865","https://openalex.org/W2901585223","https://openalex.org/W1747611275","https://openalex.org/W2784234829","https://openalex.org/W4389545329"],"abstract_inverted_index":{"In":[0,27],"this":[1],"paper,":[2],"we":[3,29,125,152,204,245],"investigate":[4],"the":[5,17,31,39,70,73,80,91,95,121,127,133,136,145,154,168,176,190,197,206,218,251,262,265,294,315,322],"roles":[6],"of":[7,21,33,59,86,94,144,148,199,217,235,264,314,324],"cooperative":[8,110],"jamming":[9],"(CJ)":[10],"and":[11,72,99,135,170,239,269],"noise":[12,50,115],"forwarding":[13],"(NF)":[14],"in":[15,37,41,142,167,283,312],"improving":[16],"achievable":[18,193,316],"secrecy":[19,92,194,317],"rates":[20],"a":[22,34,42,56,65,102,108,113,247,284,288],"Gaussian":[23,49],"wiretap":[24,97],"channel":[25,44,98],"(GWT).":[26],"particular,":[28],"study":[30],"role":[32],"deaf":[35,87,149,155,181],"helper":[36,156],"confusing":[38],"eavesdropper":[40,74],"GWT":[43],"by":[45,54,300],"either":[46,107],"transmitting":[47,55],"white":[48],"(cooperative":[51],"jamming)":[52],"or":[53,112],"dummy":[57],"codeword":[58],"no":[60],"context":[61],"yet":[62],"drawn":[63],"from":[64],"codebook":[66],"known":[67],"to":[68,139,174,308,321],"both":[69,119,132],"destination":[71],"(noise":[75],"forwarding).":[76],"We":[77,260],"first":[78],"derive":[79,126,261],"conditions":[81],"under":[82],"which":[83,281],"each":[84,143],"mode":[85],"cooperation":[88],"improves":[89],"over":[90],"capacity":[93],"original":[96],"show":[100,270],"that":[101,188],"helping":[103,137],"node":[104,138],"can":[105],"be":[106,140],"useful":[109,114],"jammer":[111],"forwarder":[116],"but":[117],"not":[118],"at":[120],"same":[122],"time.":[123],"Secondly,":[124],"optimal":[128,207,211,219,295],"power":[129,212],"allocation":[130],"for":[131,232,250,272],"source":[134],"used":[141],"two":[146],"modes":[147],"helping.":[150],"Thirdly,":[151],"consider":[153],"selection":[157,208,220,252,267],"problem":[158,253],"where":[159],"there":[160],"are":[161],"<i":[162,178,183,200,223,236,240,255,273,325],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[163,179,184,201,224,237,241,256,274,326],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">N</i>":[164,242],"relays":[165],"present":[166],"system":[169],"it":[171],"is":[172,228],"required":[173],"select":[175],"best":[177],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">K</i>":[180,185,202,225,238,257,275,327],"helpers,":[182],"\u2265":[186],"1,":[187,277],"yield":[189],"maximum":[191],"possible":[192],"rate.":[195],"For":[196],"case":[198,323],"=1,":[203],"give":[205],"strategy":[209,221,249,305],"with":[210,319],"allocation.":[213],"The":[214],"computational":[215,291],"complexity":[216,263,292],"when":[222,254],">":[226,258,276],"1":[227],"relatively":[229],"large,":[230],"especially":[231],"large":[233],"values":[234],".":[243],"Thus,":[244],"propose":[246],"suboptimal":[248,279,304],"1.":[259],"proposed":[266],"strategies":[268],"that,":[271],"our":[278,303],"strategy,":[280],"works":[282],"greedy":[285],"fashion,":[286],"enjoys":[287],"significantly":[289],"less":[290],"than":[293],"strategy.":[296],"Nevertheless,":[297],"as":[298],"demonstrated":[299],"numerical":[301],"examples,":[302],"gives":[306],"rise":[307],"reasonable":[309],"performance":[310],"gains":[311],"terms":[313],"rate":[318],"respect":[320],"=1.":[328]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":14},{"year":2013,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
