{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:09:49Z","timestamp":1743005389514,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030786113"},{"type":"electronic","value":"9783030786120"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78612-0_46","type":"book-chapter","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T23:38:40Z","timestamp":1625787520000},"page":"575-587","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMA"],"prefix":"10.1007","author":[{"given":"Yuxin","family":"Du","sequence":"first","affiliation":[]},{"given":"Xiaoli","family":"He","sequence":"additional","affiliation":[]},{"given":"Weijian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xinwen","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yongming","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"46_CR1","unstructured":"FCC ET Docket No. 03-108. Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies (2003)"},{"issue":"10","key":"46_CR2","doi-asserted-by":"publisher","first-page":"1647","DOI":"10.1109\/LSP.2015.2417119","volume":"22","author":"S Timotheou","year":"2015","unstructured":"Timotheou, S., Krikidis, I.: Fairness for non-orthogonal multiple access in 5G systems. IEEE Signal Process. Lett. 22(10), 1647\u20131651 (2015)","journal-title":"IEEE Signal Process. Lett."},{"issue":"1","key":"46_CR3","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/JSTSP.2010.2052784","volume":"5","author":"G Zhao","year":"2011","unstructured":"Zhao, G., Yang, C., Li, G.Y., et al.: Power and channel allocation for cooperative relay in cognitive radio networks. IEEE J. Sel. Top. Signal Process. 5(1), 151\u2013159 (2011)","journal-title":"IEEE J. Sel. Top. Signal Process."},{"issue":"4","key":"46_CR4","first-page":"405","volume":"4","author":"S Qi","year":"2017","unstructured":"Qi, S., Han, S., Chilin, I., et al.: On the Ergodic capacity of MIMO NOMA systems. IEEE Wirel. Commun. Lett. 4(4), 405\u2013408 (2017)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"1","key":"46_CR5","first-page":"1","volume":"4","author":"EF Orumwense","year":"2014","unstructured":"Orumwense, E.F., Oyerinde, O., Mneney, S.: Impact of primary user emulation attacks on cognitive radio networks. Int. J. Commun. Antenna Propag. 4(1), 1\u201326 (2014)","journal-title":"Int. J. Commun. Antenna Propag."},{"issue":"8","key":"46_CR6","doi-asserted-by":"publisher","first-page":"6010","DOI":"10.1109\/TVT.2015.2480766","volume":"65","author":"Z Ding","year":"2014","unstructured":"Ding, Z., Fan, P., Poor, H.V.: Impact of user pairing on 5G non-orthogonal multiple access. IEEE Trans. Veh. Technol. 65(8), 6010\u20136023 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"12","key":"46_CR7","doi-asserted-by":"publisher","first-page":"10152","DOI":"10.1109\/TVT.2016.2524694","volume":"65","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Ding, Z., Elkashlan, M., et al.: Non-orthogonal multiple access in large-scale underlay cognitive radio networks. IEEE Trans. Veh. Technol. 65(12), 10152\u201310157 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"46_CR8","doi-asserted-by":"publisher","first-page":"7563","DOI":"10.1109\/TVT.2017.2658563","volume":"66","author":"Y Li","year":"2017","unstructured":"Li, Y., Jiang, M., Zhang, Q., et al.: Secure beam forming in downlink MISO non-orthogonal multiple access system. IEEE Trans. Veh. Technol. 66(8), 7563\u20137567 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"46_CR9","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","volume":"31","author":"Y Zou","year":"2013","unstructured":"Zou, Y., Wang, X., Shen, W.: Optimal relay selection for physical-layer security in cooperative wireless networks. IEEE J. Sel. Areas Commun. 31(10), 2099\u20132111 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"6","key":"46_CR10","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2012.6211495","volume":"50","author":"I Christian","year":"2012","unstructured":"Christian, I., Moh, S., Chung, I., Lee, J.: Spectrum mobility in cognitive radio networks. IEEE Commun. Mag. 50(6), 114\u2013121 (2012)","journal-title":"IEEE Commun. Mag."},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, L., Sun, J.: Channel allocation and power control scheme over interference channels with QoS constraints. In: IEEE International Conference on Control & Automation. IEEE (2017)","DOI":"10.1109\/ICCA.2017.8003161"},{"issue":"4","key":"46_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LWC.2015.2446832","volume":"4","author":"Z Li","year":"2015","unstructured":"Li, Z., Jing, T., Cheng, X., et al.: Cooperative jamming for secure communications in MIMO cooperative cognitive radio networks. IEEE Wirel. Commun. Lett. 4(4), 1 (2015)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"1","key":"46_CR13","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11276-014-0775-1","volume":"21","author":"F Li","year":"2014","unstructured":"Li, F., Wang, L., Hua, J., Meng, L., Zhang, J.: Power optimization for dynamic spectrum access with convex optimization and intelligent algorithm. Wireless Netw. 21(1), 161\u2013172 (2014). https:\/\/doi.org\/10.1007\/s11276-014-0775-1","journal-title":"Wireless Netw."},{"issue":"1","key":"46_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10957-014-0656-x","volume":"168","author":"H Hu","year":"2016","unstructured":"Hu, H., Zhang, H., Yu, H.: Energy-efficient sensing for delay-constrained cognitive radio systems via convex optimization. J. Optim. Theory Appl. 168(1), 1\u201322 (2016)","journal-title":"J. Optim. Theory Appl."},{"key":"46_CR15","doi-asserted-by":"crossref","unstructured":"Devral,A.M., Sharma, M.K., Murthy, C.R.: Power allocation in energy harvesting sensors with ARQ: a convex optimization approach. In: Signal and Information Processing IEEE, pp. 208\u2013212 (2014)","DOI":"10.1109\/GlobalSIP.2014.7032108"},{"issue":"4","key":"46_CR16","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1109\/TSP.2015.2494852","volume":"64","author":"WH Chen","year":"2016","unstructured":"Chen, W.H., Lin, W.R., Tsao, H.C., Lin, C.: Probabilistic power allocation for cognitive radio networks with outage constraints and one-bit side information. IEEE Trans. Signal Process. 64(4), 867\u2013881 (2016)","journal-title":"IEEE Trans. Signal Process."},{"issue":"12","key":"46_CR17","doi-asserted-by":"publisher","first-page":"5103","DOI":"10.1109\/TCOMM.2013.111213.130235","volume":"61","author":"Y Zou","year":"2013","unstructured":"Zou, Y., Wang, X., Shen, W.: Physical-layer security with multiuser scheduling in cognitive radio networks. IEEE Trans. Commun. 61(12), 5103\u20135113 (2013)","journal-title":"IEEE Trans. Commun."},{"issue":"7","key":"46_CR18","doi-asserted-by":"publisher","first-page":"5825","DOI":"10.1109\/TVT.2015.2453364","volume":"65","author":"J Zhu","year":"2016","unstructured":"Zhu, J., Zou, Y., Champagne, B., Zhu, W., Hanzo, L.: Security-reliability trade off analysis of multirelay-aided decode and forward cooperation systems. IEEE Trans. Veh. Technol. 65(7), 5825\u20135831 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"14","key":"46_CR19","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1002\/wcm.2466","volume":"15","author":"Y Xu","year":"2015","unstructured":"Xu, Y., Zhao, X.: Distributed power control for multiuser cognitive radio networks with quality of service and interference temperature constraints. Wirel. Commun. Mob. Comput. 15(14), 1773\u20131783 (2015)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"7","key":"46_CR20","doi-asserted-by":"publisher","first-page":"2563","DOI":"10.1007\/s00034-015-0163-9","volume":"35","author":"N Zhao","year":"2016","unstructured":"Zhao, N.: Joint Optimization of cooperative spectrum sensing and resource allocation in multi-channel cognitive radio sensor networks. Circuits Syst. Signal Process. 35(7), 2563\u20132583 (2016)","journal-title":"Circuits Syst. Signal Process."},{"key":"46_CR21","doi-asserted-by":"crossref","unstructured":"Xu, D., Feng, Z., Li, Y., et al.: Fair channel allocation and power control for uplink and downlink cognitive radio networks.In: GLOBECOM Workshops, pp. 591\u2013596. IEEE (2011)","DOI":"10.1109\/GLOCOMW.2011.6162520"},{"key":"46_CR22","unstructured":"Wang, X.: Computer Algorithm Design and Analysis, 4th edn, pp. 154\u2013196. Publishing House of Electronics Industry,Beijing (2007). ISBN 9787121042782"},{"key":"46_CR23","doi-asserted-by":"crossref","unstructured":"Luwei Wei, F., Tao Jin, M.: A Physical Layer Security Scheme for NOMA-enabled Cognitive Radio Networks, 9 May 2019","DOI":"10.1109\/ICC.2018.8422834"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78612-0_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T22:09:57Z","timestamp":1630361397000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78612-0_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030786113","9783030786120"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78612-0_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}