{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T17:40:10Z","timestamp":1748799610639,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662493892"},{"type":"electronic","value":"9783662493908"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49390-8_62","type":"book-chapter","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T18:17:15Z","timestamp":1457374635000},"page":"640-650","source":"Crossref","is-referenced-by-count":3,"title":["DC Programming and DCA for Enhancing Physical Layer Security via Relay Beamforming Strategies"],"prefix":"10.1007","author":[{"given":"Tran Thi","family":"Thuy","sequence":"first","affiliation":[]},{"given":"Nguyen Nhu","family":"Tuan","sequence":"additional","affiliation":[]},{"given":"Le Thi Hoai","family":"An","sequence":"additional","affiliation":[]},{"given":"Alain","family":"G\u00e9ly","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"62_CR1","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TSP.2011.2177824","volume":"60","author":"A Al-Shatri","year":"2012","unstructured":"Al-Shatri, A., Weber, T.: Achieving the maximum sum rate using DC programming in cellular networks. IEEE Trans. Sig. Process 60(3), 1331\u20131341 (2012)","journal-title":"IEEE Trans. Sig. Process"},{"issue":"6","key":"62_CR2","doi-asserted-by":"publisher","first-page":"2962","DOI":"10.1109\/TSP.2012.2189388","volume":"60","author":"Y Cheng","year":"2012","unstructured":"Cheng, Y., Pesavento, M.: Joint optimization of source power allocation and distributed relay beamforming in multiuser peer-to-peer relay networks. IEEE Trans. Sig. Process. 60(6), 2962\u20132973 (2012)","journal-title":"IEEE Trans. Sig. Process."},{"issue":"3","key":"62_CR3","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong, L., Han, Z., Petropulu, A., Poor, H.: Improving wireless physical layer security via cooperating relays. IEEE Trans. Sig. Process 58(3), 1875\u20131888 (2010)","journal-title":"IEEE Trans. Sig. Process"},{"issue":"1","key":"62_CR4","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/TIT.2010.2090215","volume":"57","author":"E Ekrem","year":"2011","unstructured":"Ekrem, E., Ulukus, S.: Secrecy in cooperative relay broadcast channels. IEEE Trans. Inf. Theory 57(1), 137\u2013155 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"62_CR5","doi-asserted-by":"publisher","first-page":"3053","DOI":"10.1109\/TSP.2009.2020002","volume":"57","author":"S Fazeli-Dehkordy","year":"2009","unstructured":"Fazeli-Dehkordy, S., ShahbazPanahi, S., Gazor, S.: Multiple peer-to-peer communications using a network of relays. IEEE Trans. Signal Process. 57(8), 3053\u20133062 (2009)","journal-title":"IEEE Trans. Signal Process."},{"issue":"6","key":"62_CR6","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Commun. 7(6), 2180\u20132189 (2008)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"9","key":"62_CR7","doi-asserted-by":"publisher","first-page":"4966","DOI":"10.1109\/TSP.2010.2051431","volume":"58","author":"V Havary-Nassab","year":"2010","unstructured":"Havary-Nassab, V., ShahbazPanahi, S., Grami, A.: Joint receive-transmit beamforming for multi-antenna relaying schemes. IEEE Trans. Signal Process. 58(9), 4966\u20134972 (2010)","journal-title":"IEEE Trans. Signal Process."},{"key":"62_CR8","first-page":"65","volume-title":"Securing Wireless Communications at the Physical Layer","author":"X He","year":"2010","unstructured":"He, X., Yener, A.: Cooperative jamming: the tale of friendly interference for secrecy. In: Liu, R., Trappe, W. (eds.) Securing Wireless Communications at the Physical Layer, pp. 65\u201388. Spinger, Heidelberg (2010)"},{"issue":"12","key":"62_CR9","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1109\/TIT.2003.820010","volume":"49","author":"A Hero","year":"2003","unstructured":"Hero, A.: Secure space-time communication. IEEE Trans. Inf. Theory 49(12), 3235\u20133249 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"62_CR10","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/TIT.2009.2018175","volume":"55","author":"Y Jing","year":"2009","unstructured":"Jing, Y., Jafarkhani, H.: Network beamforming using relays with perfect channel information. IEEE Trans. Inf. Theory 55(6), 2499\u20132517 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"62_CR11","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TWC.2011.120911.110139","volume":"11","author":"HH Kha","year":"2012","unstructured":"Kha, H.H., Tuan, H.D., Nguyen, H.H.: Fast global optimal power allocation in wireless network by local DC programming. IEEE Trans. Wireless Commun. 11(2), 510\u2013512 (2012)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"62_CR12","unstructured":"Le Thi, H.A.: DC Programming and DCA. http:\/\/www.lita.univ-lorraine.fr\/~lethi\/"},{"issue":"12","key":"62_CR13","doi-asserted-by":"publisher","first-page":"2827","DOI":"10.1162\/NECO_a_00673","volume":"26","author":"HA Le Thi","year":"2014","unstructured":"Le Thi, H.A., Nguyen, M.C., Pham Dinh, T.: A DC Programming Approach for Finding Communities in Networks. Neural Comput. 26(12), 2827\u20132854 (2014)","journal-title":"Neural Comput."},{"key":"62_CR14","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1007\/s10618-014-0369-7","volume":"28","author":"HA Le Thi","year":"2014","unstructured":"Le Thi, H.A., Nguyen, M.C., Pham Dinh, T.: Self-organizing maps by difference of convex functions optimization. Data Min. Knowl. Disc. 28, 1336\u20131365 (2014)","journal-title":"Data Min. Knowl. Disc."},{"key":"62_CR15","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s10479-004-5022-1","volume":"133","author":"HA Le Thi","year":"2005","unstructured":"Le Thi, H.A., Pham Dinh, T.: The DC (difference of convex functions) programming and DCA revisited with DC models of real world nonconvex optimization problems. Ann. Oper. Res. 133, 23\u201346 (2005)","journal-title":"Ann. Oper. Res."},{"issue":"1","key":"62_CR16","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ejor.2014.11.031","volume":"244","author":"HA Le Thi","year":"2015","unstructured":"Le Thi, H.A., Vo, X.T., Le, H.M.: DC approximation approaches for sparse optimization. Eur. J. Oper. Res. 244(1), 26\u201346 (2015)","journal-title":"Eur. J. Oper. Res."},{"key":"62_CR17","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.neunet.2014.06.011","volume":"59","author":"HA Le Thi","year":"2014","unstructured":"Le Thi, H.A., Vo, X.T., Pham Dinh, T.: Feature selection for linear SVMs under uncertain data: Robust optimization based on difference of convex functions algorithms. Neural Netw. 59, 36\u201350 (2014)","journal-title":"Neural Netw."},{"issue":"10","key":"62_CR18","doi-asserted-by":"publisher","first-page":"4985","DOI":"10.1109\/TSP.2011.2159598","volume":"59","author":"J Li","year":"2011","unstructured":"Li, J., Petropulu, A., Weber, S.: On cooperative relaying schemes for wireless physical layer security. IEEE Trans. Sig. Process 59(10), 4985\u20134997 (2011)","journal-title":"IEEE Trans. Sig. Process"},{"issue":"6","key":"62_CR19","doi-asserted-by":"publisher","first-page":"2593","DOI":"10.1109\/TSP.2006.890913","volume":"55","author":"O Munoz-Medina","year":"2007","unstructured":"Munoz-Medina, O., Vidal, J., Agustin, A.: Linear transceiver design in nonregenerative relays with channel state information. IEEE Trans. Sig. Process. 55(6), 2593\u20132604 (2007)","journal-title":"IEEE Trans. Sig. Process."},{"key":"62_CR20","doi-asserted-by":"crossref","unstructured":"Negi, R., Goel, S.: Secret communication using artificial noise. In: 2005 IEEE 62nd Vehicular Technology Conference, VTC-2005-Fall, vol. 3, pp. 1906\u20131910, September 2005","DOI":"10.1109\/VETECF.2005.1558439"},{"key":"62_CR21","doi-asserted-by":"crossref","unstructured":"Parada, P., Blahut, R.: Secrecy capacity of simo and slow fading channels. In: Proceedings of the International Symposium on Information Theory, ISIT 2005, pp. 2152\u20132155, September 2005","DOI":"10.1109\/ISIT.2005.1523727"},{"issue":"1","key":"62_CR22","first-page":"289","volume":"22","author":"T Pham Dinh","year":"1997","unstructured":"Pham Dinh, T., Le Thi, H.A.: Convex analysis approach to DC programming: theory, algorithms and applications. Acta Mathematica Vietnamica 22(1), 289\u2013357 (1997)","journal-title":"Acta Mathematica Vietnamica"},{"key":"62_CR23","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1137\/S1052623494274313","volume":"8","author":"T Pham Dinh","year":"1998","unstructured":"Pham Dinh, T., Le Thi, H.A.: Optimization algorithms for solving the trustregion subproblem. SIAM J. Optim. 8, 476\u2013505 (1998)","journal-title":"SIAM J. Optim."},{"key":"62_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-54455-2_1","volume-title":"Transactions on Computational Intelligence XIII","author":"T Pham Dinh","year":"2014","unstructured":"Pham Dinh, T., Le Thi, H.A.: Recent advances in DC programming and DCA. In: Nguyen, N.-T., Le-Thi, H.A. (eds.) TCCI 2013. LNCS, vol. 8342, pp. 1\u201337. Springer, Heidelberg (2014)"},{"key":"62_CR25","doi-asserted-by":"crossref","unstructured":"Shafiee, S., Ulukus, S.: Achievable rates in gaussian miso channels with secrecy constraints. In: IEEE International Symposium on Information Theory, 2007, ISIT 2007, pp. 2466\u20132470, June 2007","DOI":"10.1109\/ISIT.2007.4557589"},{"issue":"11","key":"62_CR26","doi-asserted-by":"publisher","first-page":"4026","DOI":"10.1109\/TWC.2012.092112.112072","volume":"11","author":"S ShahbazPanahi","year":"2012","unstructured":"ShahbazPanahi, S., Dong, M.: Achievable rate region under joint distributed beamforming and power allocation for two-way relay networks. IEEE Trans. Wireless Commun. 11(11), 4026\u20134037 (2012)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"1","key":"62_CR27","first-page":"134","volume":"12","author":"I Stanojev","year":"2013","unstructured":"Stanojev, I., Yener, A.: Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Trans. Inf. Forensics Secur. 12(1), 134\u2013145 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"62_CR28","unstructured":"Vucic, N., Schubert, M.: DC programming approach for resource allocation in wireless networks. In: IEEE, Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, pp. 380\u2013386, May 2010"},{"key":"62_CR29","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell Sys. Tech. J. 54, 1355\u20131387 (1975)","journal-title":"Bell Sys. Tech. J."},{"key":"62_CR30","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gursoy, M.: Collaborative relay beamforming for secrecy. In: 2010 IEEE International Conference on Communications (ICC), pp. 1\u20135, May 2010","DOI":"10.1109\/ICC.2010.5501835"},{"key":"62_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, J., Gursoy, M.: Relay beamforming strategies for physical-layer security. In: 2010 44th Annual Conference on Information Sciences and Systems (CISS), pp. 1\u20136, March 2010","DOI":"10.1109\/CISS.2010.5464970"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49390-8_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T17:27:05Z","timestamp":1748798825000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-49390-8_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662493892","9783662493908"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49390-8_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}