{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:32:23Z","timestamp":1742941943205,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031347894"},{"type":"electronic","value":"9783031347900"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-34790-0_18","type":"book-chapter","created":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T12:02:53Z","timestamp":1686312173000},"page":"231-246","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Safety Modeling and\u00a0Performance Analysis of\u00a0Urban Scenarios Based on\u00a0Poisson Line Process"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0824-8812","authenticated-orcid":false,"given":"Kong","family":"Shi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6716-1042","authenticated-orcid":false,"given":"Xinyu","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,10]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1109\/COMST.2016.2633387","volume":"19","author":"X Chen","year":"2017","unstructured":"Chen, X., Ng, D., Gerstacker, W.H., et al.: A survey on multiple-antenna techniques for physical layer security. IEEE Commun. Surv. Tutor. 19, 1027\u20131053 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"18_CR2","unstructured":"Furqan, H.M., Solaija, M.S.J., Arslan, H.: Intelligent physical layer security approach for V2X communication. arXiv preprint (2019). https:\/\/arxiv.org\/pdf\/1905.05075.pdf"},{"issue":"10","key":"18_CR3","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.001.1900141","volume":"57","author":"BM ElHalawany","year":"2019","unstructured":"ElHalawany, B.M., El-Banna, A.A.A., Wu, K.: Physical-layer security and privacy for vehicle-to-everything. IEEE Commun. Mag. 57(10), 84\u201390 (2019). https:\/\/doi.org\/10.1109\/MCOM.001.1900141","journal-title":"IEEE Commun. Mag."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Xu, L., Yu, X., Wang, H., et al.: Physical layer security performance of mobile vehicular networks. Mob. Netw. Appl. 25(4) (2019)","DOI":"10.1007\/s11036-019-01224-8"},{"issue":"3","key":"18_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MNET.2018.1700320","volume":"32","author":"Y Wu","year":"2018","unstructured":"Wu, Y., Qian, L.P., Mao, H.W., et al.: Secrecy-driven resource management for vehicular computation offloading networks. IEEE Netw. 32(3), 84\u201391 (2018)","journal-title":"IEEE Netw."},{"issue":"3","key":"18_CR6","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1109\/JSYST.2017.2700438","volume":"12","author":"YJ Tolossa","year":"2018","unstructured":"Tolossa, Y.J., Vuppala, S., Kaddoum, G., Abreu, G.: On the uplink secrecy capacity analysis in D2D-enabled cellular network. IEEE Syst. J. 12(3), 2297\u20132307 (2018)","journal-title":"IEEE Syst. J."},{"issue":"5","key":"18_CR7","first-page":"4457","volume":"26","author":"X Hu","year":"2019","unstructured":"Hu, X., Mu, P., Wang, B., Li, Z.: On the secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers. IEEE Trans. Veh. Technol. 26(5), 4457\u20134462 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"18_CR8","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1049\/iet-com.2018.5502","volume":"13","author":"R Ma","year":"2019","unstructured":"Ma, R., Yang, S., Du, M., Ou, J.: Improving physical layer security jointly using full-duplex jamming receiver and multi-antenna jammer in wireless networks. IET Commun. 13(10), 1530\u20131536 (2019)","journal-title":"IET Commun."},{"issue":"9","key":"18_CR9","doi-asserted-by":"publisher","first-page":"5764","DOI":"10.1109\/TCOMM.2020.3003946","volume":"68","author":"J Si","year":"2020","unstructured":"Si, J., Cheng, Z., Li, Z., Cheng, J., Wang, H.-M., Al-Dhahir, N.: Cooperative jamming for secure transmission with both active and passive eavesdroppers. IEEE Trans. Commun. 68(9), 5764\u20135777 (2020). https:\/\/doi.org\/10.1109\/TCOMM.2020.3003946","journal-title":"IEEE Trans. Commun."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Dhillon, H.S., Chetlur, V.V.: Poisson line cox process: foundations and applications to vehicular networks (2020)","DOI":"10.1007\/978-3-031-02379-8"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Tang, Z., Sun, Z., Li, C., et al.: Reliability performance of transmitter selection in wireless vehicular networks. In: 2020 IEEE\/CIC International Conference on Communications in China (ICCC). IEEE (2020)","DOI":"10.1109\/ICCC49849.2020.9238797"},{"issue":"3","key":"18_CR12","doi-asserted-by":"publisher","first-page":"2108","DOI":"10.1109\/TVT.2017.2744660","volume":"67","author":"L Hu","year":"2018","unstructured":"Hu, L., Wen, H., Wu, B., Tang, J., Pan, F., Liao, R.-F.: Cooperative jamming aided secrecy enhancement in wireless networks with passive eavesdroppers. IEEE Trans. Veh. Technol. 67(3), 2108\u20132117 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1109\/JCN.2012.6292244","volume":"14","author":"Y Yang","year":"2012","unstructured":"Yang, Y., Wang, W., Zhao, H., Zhao, L.: Transmitter beamforming and artificial noise with delayed feedback: secrecy rate and power allocation. J. Commun. Netw. 14(4), 374\u2013384 (2012)","journal-title":"J. Commun. Netw."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Qiu, B., Jing, C.: Performance analysis for cooperative jamming and artificial noise aided secure transmission scheme in vehicular communication network (2020)","DOI":"10.21203\/rs.3.rs-45614\/v1"},{"issue":"3","key":"18_CR15","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TIFS.2011.2134093","volume":"6","author":"D Klinc","year":"2011","unstructured":"Klinc, D., Ha, J., McLaughlin, S.W., Barros, J., Kwak, B.-J.: LDPC codes for the Gaussian wiretap channel. IEEE Trans. Inf. Forensics Secur. 6(3), 532\u2013540 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"18_CR16","doi-asserted-by":"publisher","first-page":"5659","DOI":"10.1109\/TWC.2017.2712706","volume":"16","author":"S Krishnan","year":"2017","unstructured":"Krishnan, S., Dhillon, H.S.: Spatio-temporal interference correlation and joint coverage in cellular networks. IEEE Trans. Wirel. Commun. 16(9), 5659\u20135672 (2017)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Sial, M.N., Deng, Y., Ahmed, J., Nallanathan, A., Dohler, M.: Stochastic geometry modeling of cellular V2X communication on shared uplink channels (2018)","DOI":"10.1109\/TVT.2019.2945481"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-34790-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T12:04:12Z","timestamp":1686312252000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-34790-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031347894","9783031347900"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-34790-0_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"10 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ChinaCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Communications and Networking in China","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinacom2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/chinacom.eai-conferences.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"83","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}