{"id":"https://openalex.org/W2808613110","doi":"https://doi.org/10.1109/wcnc.2018.8377423","title":"The secrecy capacity region of fading erasure Z interference channel with no CSIT","display_name":"The secrecy capacity region of fading erasure Z interference channel with no CSIT","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2808613110","doi":"https://doi.org/10.1109/wcnc.2018.8377423","mag":"2808613110"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc.2018.8377423","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2018.8377423","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014992900","display_name":"Sanjay Karmakar","orcid":"https://orcid.org/0000-0002-0755-2516"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanjay Karmakar","raw_affiliation_strings":["Electrical and Computer Engineering, North Dakota State University, Fargo, ND"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, North Dakota State University, Fargo, ND","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091189014","display_name":"Anirban Ghosh","orcid":"https://orcid.org/0000-0003-1943-9710"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anirban Ghosh","raw_affiliation_strings":["Electrical and Computer Engineering, North Dakota State University, Fargo, ND"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering, North Dakota State University, Fargo, ND","institution_ids":["https://openalex.org/I57328836"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014992900"],"corresponding_institution_ids":["https://openalex.org/I57328836"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05508226,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/binary-erasure-channel","display_name":"Binary erasure channel","score":0.8091487884521484},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.7555372714996338},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7061828970909119},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.6363001465797424},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6107058525085449},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5888417959213257},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5371106266975403},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5312663912773132},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5302369594573975},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.5054419040679932},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.4936405420303345},{"id":"https://openalex.org/keywords/erasure-code","display_name":"Erasure code","score":0.47230008244514465},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.469131201505661},{"id":"https://openalex.org/keywords/point-to-point","display_name":"Point-to-point","score":0.45307302474975586},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.4471589922904968},{"id":"https://openalex.org/keywords/polygon","display_name":"Polygon (computer graphics)","score":0.4419684112071991},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34687310457229614},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27434131503105164},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.26409712433815},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2586488127708435},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.1971989870071411},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.12863057851791382}],"concepts":[{"id":"https://openalex.org/C149862233","wikidata":"https://www.wikidata.org/wiki/Q864142","display_name":"Binary erasure channel","level":4,"score":0.8091487884521484},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.7555372714996338},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7061828970909119},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.6363001465797424},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6107058525085449},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5888417959213257},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5371106266975403},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5312663912773132},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5302369594573975},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.5054419040679932},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.4936405420303345},{"id":"https://openalex.org/C137529215","wikidata":"https://www.wikidata.org/wiki/Q5385031","display_name":"Erasure code","level":3,"score":0.47230008244514465},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.469131201505661},{"id":"https://openalex.org/C174440990","wikidata":"https://www.wikidata.org/wiki/Q681349","display_name":"Point-to-point","level":2,"score":0.45307302474975586},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.4471589922904968},{"id":"https://openalex.org/C190694206","wikidata":"https://www.wikidata.org/wiki/Q3276654","display_name":"Polygon (computer graphics)","level":3,"score":0.4419684112071991},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34687310457229614},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27434131503105164},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.26409712433815},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2586488127708435},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.1971989870071411},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.12863057851791382},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc.2018.8377423","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc.2018.8377423","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1519370757","https://openalex.org/W1547111842","https://openalex.org/W1978188352","https://openalex.org/W1979052267","https://openalex.org/W1984264355","https://openalex.org/W1986090422","https://openalex.org/W2034027090","https://openalex.org/W2043769961","https://openalex.org/W2096801404","https://openalex.org/W2104667757","https://openalex.org/W2122496159","https://openalex.org/W2128153585","https://openalex.org/W2133406100","https://openalex.org/W2144007657","https://openalex.org/W2152949905","https://openalex.org/W2399786720","https://openalex.org/W6682960017","https://openalex.org/W6712449169"],"related_works":["https://openalex.org/W2372190485","https://openalex.org/W2139769859","https://openalex.org/W2583282232","https://openalex.org/W2140357074","https://openalex.org/W2982181605","https://openalex.org/W2137028263","https://openalex.org/W2744779861","https://openalex.org/W2130518071","https://openalex.org/W2031335939","https://openalex.org/W2951344115"],"abstract_inverted_index":{"We":[0,56],"characterize":[1],"the":[2,19,34,41,54,58,65,83,87,92,105,112,116,126,134,146,163,167],"secrecy":[3,88],"capacity":[4,59,89],"region":[5,90],"of":[6,21,43,91,95,115,161],"a":[7,71,158],"Layered":[8],"Erasure":[9],"2-user":[10],"Z":[11],"interference":[12,139],"channel":[13,36],"(LEZIC)":[14],"with":[15,73,82],"arbitrary":[16],"distribution":[17],"for":[18],"numbers":[20],"layers":[22,45,155],"that":[23,33,70,110,156],"gets":[24],"erased":[25],"on":[26,46,145],"any":[27,47],"particular":[28,48],"link.":[29],"It":[30],"is":[31,50],"assumed":[32],"instantaneous":[35],"state":[37],"information":[38],"(CSI),":[39],"i.e.,":[40],"number":[42],"surviving":[44],"link":[49],"available":[51],"only":[52,153],"at":[53,76,133,154],"receivers.":[55],"prove":[57,109],"result":[60],"in":[61],"two":[62,79],"steps;":[63],"In":[64,104],"first":[66],"step,":[67,107],"we":[68,108],"show":[69],"polygon":[72,97,118],"one":[74],"vertex":[75],"origin":[77],"and":[78,129],"sides":[80],"coinciding":[81],"rate":[84],"axes":[85],"contains":[86],"LEZIC.":[93],"Characterization":[94],"this":[96],"involves":[98],"defining":[99],"an":[100],"intermediate":[101],"enhanced":[102],"channel.":[103],"second":[106],"all":[111],"non-zero":[113],"vertexes":[114],"aforementioned":[117],"can":[119],"be":[120],"achieved":[121],"by":[122,125,137],"point-to-point":[123],"coding":[124],"non-interfering":[127],"transmitter":[128,144],"decoding":[130],"its":[131],"message":[132],"interfered":[135,168],"receiver":[136,165],"treating":[138],"as":[140],"erasure.":[141],"The":[142],"interfering":[143],"other":[147],"hand,":[148],"sends":[149],"Bernoulli":[150],"i.i.d.":[151],"bits":[152],"have":[157],"better":[159],"chance":[160],"reaching":[162],"desired":[164],"than":[166],"receiver.":[169]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
