{"id":"https://openalex.org/W2558130052","doi":"https://doi.org/10.1109/wcsp.2016.7752518","title":"Improving secrecy performance via device-to-device jamming in cellular networks","display_name":"Improving secrecy performance via device-to-device jamming in cellular networks","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2558130052","doi":"https://doi.org/10.1109/wcsp.2016.7752518","mag":"2558130052"},"language":"en","primary_location":{"id":"doi:10.1109/wcsp.2016.7752518","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcsp.2016.7752518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Wireless Communications &amp; Signal Processing (WCSP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048031726","display_name":"Jian Ouyang","orcid":"https://orcid.org/0000-0003-0631-947X"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Ouyang","raw_affiliation_strings":["Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100697981","display_name":"Min Lin","orcid":"https://orcid.org/0000-0002-0296-436X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Min Lin","raw_affiliation_strings":["Nanjing Institute of Telecommunication Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing Institute of Telecommunication Technology, Nanjing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033247734","display_name":"Wei\u2010Ping Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]},{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA","CN"],"is_corresponding":false,"raw_author_name":"Wei-Ping Zhu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Concordia University, Montreal, QC, Canada","Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Institute of Signal Processing and Transmission, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100603588","display_name":"Kang An","orcid":"https://orcid.org/0000-0003-4720-0635"},"institutions":[{"id":"https://openalex.org/I4210163363","display_name":"PLA Army Engineering University","ror":"https://ror.org/05mgp8x93","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210163363"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kang An","raw_affiliation_strings":["College of Communications Engineering, PLA University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Communications Engineering, PLA University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I4210163363"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100435939","display_name":"Lei Wang","orcid":"https://orcid.org/0000-0002-4994-805X"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Wang","raw_affiliation_strings":["National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5048031726"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.3675,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67181517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"31","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7605315446853638},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7501754760742188},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.74139803647995},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6263085603713989},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.6138999462127686},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.6006407141685486},{"id":"https://openalex.org/keywords/spectral-efficiency","display_name":"Spectral efficiency","score":0.5822117328643799},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5466060042381287},{"id":"https://openalex.org/keywords/ergodic-theory","display_name":"Ergodic theory","score":0.5324870944023132},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.5263030529022217},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.5109490752220154},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4905497431755066},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4252530038356781},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.3618581295013428},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.30785852670669556},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.24598902463912964},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2123805284500122},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10138663649559021},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09145146608352661},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.08582502603530884}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7605315446853638},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7501754760742188},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.74139803647995},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6263085603713989},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.6138999462127686},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.6006407141685486},{"id":"https://openalex.org/C137246740","wikidata":"https://www.wikidata.org/wiki/Q583970","display_name":"Spectral efficiency","level":3,"score":0.5822117328643799},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5466060042381287},{"id":"https://openalex.org/C122044880","wikidata":"https://www.wikidata.org/wiki/Q5498822","display_name":"Ergodic theory","level":2,"score":0.5324870944023132},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.5263030529022217},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.5109490752220154},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4905497431755066},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4252530038356781},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.3618581295013428},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.30785852670669556},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.24598902463912964},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2123805284500122},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10138663649559021},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09145146608352661},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.08582502603530884},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcsp.2016.7752518","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcsp.2016.7752518","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Wireless Communications &amp; Signal Processing (WCSP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1969281101","https://openalex.org/W1970334960","https://openalex.org/W1977749987","https://openalex.org/W1989821035","https://openalex.org/W1993039929","https://openalex.org/W2013605702","https://openalex.org/W2043769961","https://openalex.org/W2048514502","https://openalex.org/W2049595996","https://openalex.org/W2060416030","https://openalex.org/W2062643660","https://openalex.org/W2125884950","https://openalex.org/W2139794367","https://openalex.org/W2145417574","https://openalex.org/W2156214717","https://openalex.org/W2166606237","https://openalex.org/W2168792413","https://openalex.org/W2214522634"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W2363071176","https://openalex.org/W2390585021","https://openalex.org/W2107199751","https://openalex.org/W4243812570","https://openalex.org/W4300441478","https://openalex.org/W2101989320"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,49,77],"study":[4],"the":[5,18,30,36,41,47,56,62,68,73,88,93,104,111,114,126],"secrecy":[6,58,89],"performance":[7,90],"of":[8,35,55,106],"a":[9,13,22,52,79,121],"cellular":[10,130],"network,":[11],"where":[12],"device-to-device":[14],"(D2D)":[15],"communication":[16,116],"shares":[17],"spectral":[19],"resources":[20],"with":[21],"multi-antenna":[23],"base":[24],"station":[25],"(BS).":[26],"By":[27],"assuming":[28],"known":[29],"channel":[31,64],"state":[32],"information":[33],"(CSI)":[34],"legitimate":[37],"user":[38],"and":[39],"using":[40],"maximal":[42],"ratio":[43],"transmission":[44,95,128],"(MRT)":[45],"at":[46],"BS,":[48],"first":[50],"derive":[51],"closed-form":[53],"expression":[54],"ergodic":[57,69],"capacity":[59,70],"(ESC)":[60],"for":[61,72],"wiretap":[63],"as":[65,67,120],"well":[66],"(EC)":[71],"D2D":[74,94,115],"link.":[75],"Then,":[76],"present":[78],"simple":[80],"yet":[81],"efficient":[82],"power":[83],"allocation":[84],"scheme":[85],"to":[86,102,124],"maximize":[87],"while":[91],"satisfying":[92],"requirement.":[96],"Finally,":[97],"numerical":[98],"results":[99],"are":[100],"given":[101],"demonstrate":[103],"merit":[105],"our":[107],"study,":[108],"concluding":[109],"that":[110],"interference":[112],"from":[113],"can":[117],"be":[118],"exploited":[119],"friendly":[122],"jammer":[123],"enhance":[125],"security":[127],"in":[129],"networks.":[131]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
