{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T05:24:12Z","timestamp":1747977852647,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319179957"},{"type":"electronic","value":"9783319179964"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17996-4_6","type":"book-chapter","created":{"date-parts":[[2015,4,21]],"date-time":"2015-04-21T14:35:44Z","timestamp":1429626944000},"page":"57-68","source":"Crossref","is-referenced-by-count":2,"title":["DC Programming and DCA for a Novel Resource Allocation Problem in Emerging Area of Cooperative Physical Layer Security"],"prefix":"10.1007","author":[{"given":"Thi Thuy","family":"Tran","sequence":"first","affiliation":[]},{"given":"Hoai An Le","family":"Thi","sequence":"additional","affiliation":[]},{"given":"Tao Pham","family":"Dinh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"6_CR1","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TSP.2011.2177824","volume":"60","author":"A. Al-Shatri","year":"2012","unstructured":"Al-Shatri, A., Weber, T.: Achieving the maximum sum rate using dc programming in cellular networks. IEEE Trans. Signal Process\u00a060(3), 1331\u20131341 (2012)","journal-title":"IEEE Trans. Signal Process"},{"issue":"11","key":"6_CR2","doi-asserted-by":"publisher","first-page":"2984","DOI":"10.1109\/TSP.2014.2315167","volume":"62","author":"A. Alvarado","year":"2014","unstructured":"Alvarado, A., Scutari, G., Pang, J.-S.: A new decomposition method for multiuser dc-programming and its application. IEEE Transactions on Signal Processing\u00a062(11), 2984\u20132998 (2014)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"1-2","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/0100000005","volume":"2","author":"M. Chiang","year":"2005","unstructured":"Chiang, M.: Geometric programming for communication systems. Foundations and Trends in Communication and Information Theory\u00a02(1-2), 1\u2013154 (2005)","journal-title":"Foundations and Trends in Communication and Information Theory"},{"issue":"3","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L. Dong","year":"2010","unstructured":"Dong, L., Han, Z., Petropulu, A., Poor, H.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process\u00a058(3), 1875\u20131888 (2010)","journal-title":"IEEE Trans. Signal Process"},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/950674","volume":"2009","author":"Z. Han","year":"2009","unstructured":"Han, Z., Marina, N., Debbah, M., Hjorungnes, A.: Physical layer security game: intersaction between source, eavesdropper, and friendly jammer. EURASIP J. Wireless Commun. Netw\u00a02009(1), 1\u201311 (2009)","journal-title":"EURASIP J. Wireless Commun. Netw"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"He, X., Yener, A.: Cooperative jamming: The tale of friendly interference for secrecy, pp. 65\u201388. Spinger (2010)","DOI":"10.1007\/978-1-4419-1385-2_4"},{"key":"6_CR7","unstructured":"Jorswieck, E., Wolf, A., Gerbracht, S.: Secrecy on the Physical Layer in Wireless Networks, vol.\u00a020. INTECH (2010)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Julian, D., Chiang, M., O\u2019Neill, D., Boyd, S.P.: QoS and fairness constrained convex optimization of resource allocation for wireless cellular and ad hoc networks. In: IEEE INFOCOM 2002, pp. 477\u2013486 (June 2002)","DOI":"10.1109\/INFCOM.2002.1019292"},{"issue":"2","key":"6_CR9","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TWC.2011.120911.110139","volume":"11","author":"H.H. Kha","year":"2012","unstructured":"Kha, H.H., Tuan, H.D., Nguyen, H.H.: Fast global optimal power allocation in wireless network by local dc programming. IEEE Trans. on Wireless Communications\u00a011(2), 510\u2013512 (2012)","journal-title":"IEEE Trans. on Wireless Communications"},{"key":"6_CR10","unstructured":"Le Thi, H.A.: Dc programming and dca, http:\/\/lita.sciences.univ-metz.fr\/lethi"},{"issue":"12","key":"6_CR11","doi-asserted-by":"publisher","first-page":"2827","DOI":"10.1162\/NECO_a_00673","volume":"26","author":"H.A. Le Thi","year":"2014","unstructured":"Le Thi, H.A., Nguyen, M.C., Dinh, T.P.: A dc programming approach for finding communities in networks. Neural Computation\u00a026(12), 2827\u20132854 (2014)","journal-title":"Neural Computation"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1007\/s10618-014-0369-7","volume":"28","author":"H.A. Le Thi","year":"2014","unstructured":"Le Thi, H.A., Nguyen, M.C., Pham Dinh, T.: Self-organizing maps by difference of convex functions optimization. Data Mining and Knowledge Discovery\u00a028, 1336\u20131365 (2014)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s10479-004-5022-1","volume":"133","author":"H.A. Le Thi","year":"2005","unstructured":"Le Thi, H.A., Pham Dinh, T.: The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems. Ann. Oper. Resp.\u00a0133, 23\u201346 (2005)","journal-title":"Ann. Oper. Resp."},{"issue":"1","key":"6_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ejor.2014.11.031","volume":"244","author":"H.A. Le Thi","year":"2015","unstructured":"Le Thi, H.A., Pham Dinh, T., Le, H.M., Vo, X.T.: Dc approximation approaches for sparse optimization. European Journal of Operational Research\u00a0244(1), 26\u201346 (2015)","journal-title":"European Journal of Operational Research"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.neunet.2014.06.011","volume":"59","author":"H.A. Le Thi","year":"2014","unstructured":"Le Thi, H.A., Vo, X.T., Pham Dinh, T.: Feature selection for linear svms under uncertain data: Robust optimization based on difference of convex functions algorithms. Neural Networks\u00a059, 36\u201350 (2014)","journal-title":"Neural Networks"},{"issue":"10","key":"6_CR16","doi-asserted-by":"publisher","first-page":"4985","DOI":"10.1109\/TSP.2011.2159598","volume":"59","author":"J. Li","year":"2011","unstructured":"Li, J., Petropulu, A., Weber, S.: On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Signal Process\u00a059(10), 4985\u20134997 (2011)","journal-title":"IEEE Trans. Signal Process"},{"issue":"3","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A. Mutherjee","year":"2014","unstructured":"Mutherjee, A., Fakoorian, S.A.A., Huang, J., Swindlehurst, A.L.: Principle of physical layer security in multiuser wireless networks: A survey. IEEE Communication Survey and Tutorials\u00a016(3), 1550\u20131573 (2014)","journal-title":"IEEE Communication Survey and Tutorials"},{"issue":"1","key":"6_CR18","first-page":"289","volume":"22","author":"T. Pham Dinh","year":"1997","unstructured":"Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to dc programming: Theory, algorithms and applications. Acta Mathematica Vietnamica\u00a022(1), 289\u2013357 (1997)","journal-title":"Acta Mathematica Vietnamica"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Pham Dinh, T., Le Thi, H.A.: optimization algorithms for solving the trust region subproblem. SIAM J. Optimization\u00a08 (1998)","DOI":"10.1137\/S1052623494274313"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Pham Dinh, T., Le Thi, H.A.: Recent advances on DC programming and DCA. To appear in Transactions on Computational Collective Intelligence\u00a037 (2013)","DOI":"10.1007\/978-3-642-54455-2_1"},{"key":"6_CR21","unstructured":"Piot, V., Geist, M., Pietquin, O.: Difference of convex functions programming for reinforcement learning. In: Advances in Neural Information Processing Systems (2014)"},{"issue":"1","key":"6_CR22","first-page":"134","volume":"12","author":"I. Stanojev","year":"2013","unstructured":"Stanojev, I., Yener, A.: Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Trans. Inf. Forensics Security\u00a012(1), 134\u2013145 (2013)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"6_CR23","unstructured":"Vucic, N., Schubert, M.: Dc programming approach for resource allocation in wireless networks. In: IEEE, Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, pp. 380\u2013386 (2010)"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computational Methods for Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17996-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T20:04:20Z","timestamp":1747944260000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17996-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319179957","9783319179964"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17996-4_6","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}