{"id":"https://openalex.org/W2006970517","doi":"https://doi.org/10.3390/e16042105","title":"Wiretap Channel with Information Embedding on Actions","display_name":"Wiretap Channel with Information Embedding on Actions","publication_year":2014,"publication_date":"2014-04-14","ids":{"openalex":"https://openalex.org/W2006970517","doi":"https://doi.org/10.3390/e16042105","mag":"2006970517"},"language":"en","primary_location":{"id":"doi:10.3390/e16042105","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e16042105","pdf_url":"https://www.mdpi.com/1099-4300/16/4/2105/pdf?version=1424785387","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1099-4300/16/4/2105/pdf?version=1424785387","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103193546","display_name":"Xinxing Yin","orcid":"https://orcid.org/0000-0001-8742-484X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinxing Yin","raw_affiliation_strings":["Electronic Engineering Department, Shanghai Jiao Tong University, Dongchuan Road 800, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"Electronic Engineering Department, Shanghai Jiao Tong University, Dongchuan Road 800, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062829885","display_name":"Zhi Xue","orcid":"https://orcid.org/0000-0003-2875-304X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Xue","raw_affiliation_strings":["Electronic Engineering Department, Shanghai Jiao Tong University, Dongchuan Road 800, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"Electronic Engineering Department, Shanghai Jiao Tong University, Dongchuan Road 800, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103193546"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.638,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72925863,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"16","issue":"4","first_page":"2105","last_page":"2130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8432947993278503},{"id":"https://openalex.org/keywords/equivocation","display_name":"Equivocation","score":0.7797645330429077},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.682377815246582},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6422832608222961},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.637508749961853},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6278232932090759},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5949130654335022},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.5699033737182617},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5047775506973267},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47911763191223145},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.44067704677581787},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.4130327105522156},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3221150040626526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28146350383758545},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2723054885864258},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2706436216831207},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2252824604511261},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16807714104652405},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07595273852348328}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8432947993278503},{"id":"https://openalex.org/C17859611","wikidata":"https://www.wikidata.org/wiki/Q10797615","display_name":"Equivocation","level":2,"score":0.7797645330429077},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.682377815246582},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6422832608222961},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.637508749961853},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6278232932090759},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5949130654335022},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.5699033737182617},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5047775506973267},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47911763191223145},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.44067704677581787},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.4130327105522156},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3221150040626526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28146350383758545},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2723054885864258},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2706436216831207},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2252824604511261},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16807714104652405},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07595273852348328},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/e16042105","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e16042105","pdf_url":"https://www.mdpi.com/1099-4300/16/4/2105/pdf?version=1424785387","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:de742bdbf75f49c2b70e17055a24b080","is_oa":true,"landing_page_url":"https://doaj.org/article/de742bdbf75f49c2b70e17055a24b080","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy, Vol 16, Iss 4, Pp 2105-2130 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/e16042105","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e16042105","pdf_url":"https://www.mdpi.com/1099-4300/16/4/2105/pdf?version=1424785387","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7200000286102295}],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1636981101","display_name":null,"funder_award_id":"60932003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3601058075","display_name":null,"funder_award_id":"61271220","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5249178904","display_name":null,"funder_award_id":"Grant No. 6","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6669325233","display_name":null,"funder_award_id":"61171173","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2006970517.pdf","grobid_xml":"https://content.openalex.org/works/W2006970517.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1494099594","https://openalex.org/W1549664537","https://openalex.org/W1566318173","https://openalex.org/W1972175911","https://openalex.org/W1973210230","https://openalex.org/W1995323028","https://openalex.org/W2033472920","https://openalex.org/W2036038779","https://openalex.org/W2079724142","https://openalex.org/W2087100671","https://openalex.org/W2089685561","https://openalex.org/W2094290530","https://openalex.org/W2098803819","https://openalex.org/W2099111195","https://openalex.org/W2103788346","https://openalex.org/W2117207825","https://openalex.org/W2124890704","https://openalex.org/W2129948980","https://openalex.org/W2167577564","https://openalex.org/W2294707751","https://openalex.org/W2947000318","https://openalex.org/W2949866970","https://openalex.org/W2950340758","https://openalex.org/W3098429711","https://openalex.org/W3098860269","https://openalex.org/W3169111758","https://openalex.org/W4300840296","https://openalex.org/W6643468168","https://openalex.org/W6674664628"],"related_works":["https://openalex.org/W2949679674","https://openalex.org/W4235702756","https://openalex.org/W2131491518","https://openalex.org/W2951762147","https://openalex.org/W2145668821","https://openalex.org/W2114007974","https://openalex.org/W2150528942","https://openalex.org/W2147348113","https://openalex.org/W2154832352","https://openalex.org/W1483037127"],"abstract_inverted_index":{"Information":[0],"embedding":[1,163,181],"on":[2,84,105,125,186],"actions":[3,19],"is":[4,14,47,139,149],"a":[5,11,40,44,51,90,121,183],"new":[6,122],"channel":[7,91,96,132],"model":[8,37],"in":[9,53],"which":[10],"specific":[12,117],"decoder":[13],"used":[15],"to":[16,58,63,151],"observe":[17],"the":[18,22,28,32,54,60,64,71,79,85,100,106,116,126,130,142,153,156,161,166,172,176,188,193],"taken":[20],"by":[21,114],"encoder":[23],"and":[24,38,66,81,102,136,160,175],"retrieve":[25],"part":[26],"of":[27,88,129,179,192],"message":[29,62],"intended":[30],"for":[31],"receiver.":[33],"We":[34,77,169],"revisit":[35],"this":[36],"consider":[39],"different":[41],"scenario":[42],"where":[43],"secrecy":[45,108,158,167,173,189],"constraint":[46,174],"imposed.":[48],"By":[49],"adding":[50],"wiretapper":[52,72],"model,":[55],"we":[56,119],"aim":[57],"send":[59],"confidential":[61],"receiver":[65],"keep":[67],"it":[68,138],"secret":[69],"from":[70],"as":[73,75],"much":[74],"possible.":[76],"characterize":[78],"inner":[80],"outer":[82,123,144],"bounds":[83,104],"capacity-equivocation":[86,127],"region":[87,128],"such":[89],"with":[92,133],"noncausal":[93],"(and":[94],"causal)":[95],"state":[97],"information.":[98],"Furthermore,":[99],"lower":[101],"upper":[103],"sum":[107,157],"capacity":[109],"are":[110],"also":[111],"obtained.":[112],"Besides,":[113],"eliminating":[115],"decoder,":[118],"get":[120],"bound":[124],"wiretap":[131],"action-dependent":[134],"states":[135],"prove":[137],"tighter":[140],"than":[141],"existing":[143],"bound.":[145],"A":[146],"binary":[147],"example":[148],"presented":[150],"illustrate":[152],"tradeoff":[154],"between":[155],"rate":[159,164,191],"information":[162,180],"under":[165],"constraint.":[168],"find":[170],"that":[171],"communication":[177,195],"requirements":[178],"have":[182],"negative":[184],"impact":[185],"improving":[187],"transmission":[190],"given":[194],"link.":[196]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
