{"id":"https://openalex.org/W1923046584","doi":"https://doi.org/10.1109/twc.2015.2453260","title":"Optimization of Code Rates in SISOME Wiretap Channels","display_name":"Optimization of Code Rates in SISOME Wiretap Channels","publication_year":2015,"publication_date":"2015-07-08","ids":{"openalex":"https://openalex.org/W1923046584","doi":"https://doi.org/10.1109/twc.2015.2453260","mag":"1923046584"},"language":"en","primary_location":{"id":"doi:10.1109/twc.2015.2453260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2015.2453260","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1507.03729","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Shihao Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Shihao Yan","raw_affiliation_strings":["School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, N.S.W., Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, N.S.W., Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Nan Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I118347636","display_name":"Australian National University","ror":"https://ror.org/019wvm592","country_code":"AU","type":"education","lineage":["https://openalex.org/I118347636"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nan Yang","raw_affiliation_strings":["School of Electrical Engineering and Telecommunications, Australia National University, Canberra, A.C.T., Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Telecommunications, Australia National University, Canberra, A.C.T., Australia","institution_ids":["https://openalex.org/I118347636"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Giovanni Geraci","orcid":null},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Giovanni Geraci","raw_affiliation_strings":["Wireless Networks and Decision Systems Group, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Wireless Networks and Decision Systems Group, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Robert Malaney","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Robert Malaney","raw_affiliation_strings":["School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, N.S.W., Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, N.S.W., Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":null,"display_name":"Jinhong Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jinhong Yuan","raw_affiliation_strings":["School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, N.S.W., Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, N.S.W., Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":5.2186,"has_fulltext":false,"cited_by_count":73,"citation_normalized_percentile":{"value":0.9577756,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"14","issue":"11","first_page":"6377","last_page":"6388"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.0017000000225380063,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.001500000013038516,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7275999784469604},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6816999912261963},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.6126000285148621},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5893999934196472},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5791000127792358},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5080999732017517},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.4778999984264374},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4650999903678894},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.45750001072883606},{"id":"https://openalex.org/keywords/code-rate","display_name":"Code rate","score":0.4332999885082245}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7512000203132629},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7275999784469604},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6816999912261963},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.6126000285148621},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5893999934196472},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5791000127792358},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5189999938011169},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5080999732017517},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.4778999984264374},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4650999903678894},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.45750001072883606},{"id":"https://openalex.org/C206468330","wikidata":"https://www.wikidata.org/wiki/Q834373","display_name":"Code rate","level":3,"score":0.4332999885082245},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4007999897003174},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.398499995470047},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.3982999920845032},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3560999929904938},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.33959999680519104},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.33399999141693115},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.32820001244544983},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.3215999901294708},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3140999972820282},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3111000061035156},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.3052999973297119},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2870999872684479},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27250000834465027},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2669999897480011},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.26159998774528503},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C118437007","wikidata":"https://www.wikidata.org/wiki/Q1017139","display_name":"Hybrid automatic repeat request","level":3,"score":0.25130000710487366},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.25060001015663147}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/twc.2015.2453260","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2015.2453260","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1507.03729","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1507.03729","pdf_url":"https://arxiv.org/pdf/1507.03729","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1507.03729","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1507.03729","pdf_url":"https://arxiv.org/pdf/1507.03729","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1738222114","display_name":null,"funder_award_id":"DP120102607","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W595252221","https://openalex.org/W1568096262","https://openalex.org/W1967516555","https://openalex.org/W1986090422","https://openalex.org/W1999989543","https://openalex.org/W2026566189","https://openalex.org/W2043769961","https://openalex.org/W2061759835","https://openalex.org/W2062612962","https://openalex.org/W2072563372","https://openalex.org/W2080693943","https://openalex.org/W2082276212","https://openalex.org/W2093554016","https://openalex.org/W2099773821","https://openalex.org/W2104826846","https://openalex.org/W2109394932","https://openalex.org/W2110762757","https://openalex.org/W2110822293","https://openalex.org/W2112513314","https://openalex.org/W2113706820","https://openalex.org/W2119012490","https://openalex.org/W2124602541","https://openalex.org/W2128153585","https://openalex.org/W2133406100","https://openalex.org/W2155438308","https://openalex.org/W2156214717","https://openalex.org/W2159437533","https://openalex.org/W2163632632","https://openalex.org/W2949672874"],"related_works":[],"abstract_inverted_index":{"We":[0,82],"propose":[1],"a":[2,41],"new":[3,42],"framework":[4],"for":[5,92,161,176],"determining":[6],"the":[7,18,21,28,35,48,60,63,67,72,75,88,102,105,111,120,123,130,144,149,156,162,177],"wiretap":[8,15,53,89,163,180],"code":[9,90,164],"rates":[10,91,165],"of":[11,20,52,66,104,122,148],"single-input-single-output":[12],"multiantenna":[13],"eavesdropper":[14],"channels":[16],"when":[17],"capacity":[19,103,121],"eavesdropper's":[22,150],"channel":[23,107,125,151],"is":[24,108,126,152],"not":[25,127,153,167],"available":[26,109,128,154],"at":[27,110,129,155],"transmitter.":[29,131,157],"In":[30],"our":[31,159],"framework,":[32],"we":[33],"introduce":[34],"effective":[36],"secrecy":[37,174],"throughput":[38],"(EST)":[39],"as":[40],"performance":[43],"metric":[44],"that":[45],"explicitly":[46],"captures":[47],"two":[49,93],"key":[50],"features":[51],"channels,":[54],"namely,":[55],"reliability":[56,172],"and":[57,113],"secrecy.":[58],"Notably,":[59,158],"EST":[61],"measures":[62],"average":[64,145],"rate":[65],"confidential":[68],"information":[69],"transmitted":[70],"from":[71],"transmitter":[73,112],"to":[74,86,170],"intended":[76],"receiver":[77],"without":[78],"being":[79],"eavesdropped":[80],"on.":[81],"provide":[83],"easy-to-implement":[84],"methods":[85],"determine":[87],"transmission":[94,98,116,178],"schemes:":[95],"1)":[96],"adaptive":[97],"scheme":[99,117],"in":[100,118],"which":[101,119],"main":[106,124],"2)":[114],"fixed-rate":[115],"Such":[132],"determinations":[133],"are":[134],"further":[135],"extended":[136],"into":[137],"an":[138],"absolute-passive":[139],"eavesdropping":[140],"scenario":[141],"where":[142],"even":[143],"signal-to-noise":[146],"ratio":[147],"solutions":[160],"do":[166],"require":[168],"us":[169],"set":[171],"or":[173],"constraints":[175],"within":[179],"channels.":[181]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2016-06-24T00:00:00"}
