{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:49:59Z","timestamp":1743032999477,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811381379"},{"type":"electronic","value":"9789811381386"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-8138-6_28","type":"book-chapter","created":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T08:47:49Z","timestamp":1557478069000},"page":"334-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Analysis of Full-Duplex Cooperative Systems over Correlated Fading Channels"],"prefix":"10.1007","author":[{"given":"Bicheng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ruoqi","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Jianling","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,11]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/MCOM.2017.1700588","volume":"56","author":"B Nguyen","year":"2018","unstructured":"Nguyen, B., Jung, H., Kim, K.: Physical layer security schemes for full-duplex cooperative systems: state of the art and beyond. IEEE Commun. Mag. 56, 131\u2013137 (2018)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"28_CR2","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/MVT.2012.2216751","volume":"7","author":"M Torabi","year":"2012","unstructured":"Torabi, M., Haccoun, D., Frigon, J.: Relay selection in AF cooperative systems: an overview. IEEE Veh. Technol. Mag. 7(4), 104\u2013113 (2012)","journal-title":"IEEE Veh. Technol. Mag."},{"issue":"1","key":"28_CR3","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/TWC.2017.2767601","volume":"17","author":"G Liu","year":"2018","unstructured":"Liu, G., Chen, X., Ding, Z., et al.: Hybrid half-duplex\/full-duplex cooperative non-orthogonal multiple access with transmit power adaptation. IEEE Trans. Wirel. Commun. 17(1), 506\u2013519 (2018)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"He, H., Ren, P., Du, Q., et al.: Full-duplex or half-duplex? Hybrid relay selection for physical layer secrecy. In: IEEE Vehicular Technology Conference, pp. 1\u20135 (2016)","DOI":"10.1109\/VTCSpring.2016.7504252"},{"issue":"5","key":"28_CR5","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/LWC.2017.2721944","volume":"6","author":"PC Sofotasios","year":"2017","unstructured":"Sofotasios, P.C., Fikadu, M.K., Muhaidat, S., et al.: Relay selection based full-duplex cooperative systems under adaptive transmission. IEEE Wirel. Commun. Lett. 6(5), 602\u2013605 (2017)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"8","key":"28_CR6","doi-asserted-by":"publisher","first-page":"7599","DOI":"10.1109\/TVT.2017.2669240","volume":"66","author":"L Fan","year":"2017","unstructured":"Fan, L., Lei, X., Yang, N., et al.: Secrecy cooperative networks with outdated relay selection over correlated fading channels. IEEE Trans. Veh. Technol. 66(8), 7599\u20137603 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"7","key":"28_CR7","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.1109\/TCOMM.2017.2691712","volume":"65","author":"L Fan","year":"2017","unstructured":"Fan, L., Zhao, R., Gong, F., et al.: Secure multiple amplify-and-forward relaying over correlated fading channels. IEEE Trans. Commun. 65(7), 2811\u20132820 (2017)","journal-title":"IEEE Trans. Commun."},{"issue":"9","key":"28_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSEN.2016.2532218","volume":"16","author":"B Nguyen","year":"2016","unstructured":"Nguyen, B., Kim, K.: Performance analysis of amplify-and-forward systems with single relay selection in correlated environments. Sensors 16(9), 1\u201315 (2016)","journal-title":"Sensors"},{"issue":"2","key":"28_CR9","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/JSAC.2012.120218","volume":"30","author":"X Cheng","year":"2012","unstructured":"Cheng, X., Wang, C., Wang, H., et al.: Cooperative MIMO channel modeling and multi-link spatial correlation properties. IEEE J. Sel. Areas Commun. 30(2), 388\u2013396 (2012)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"28_CR10","doi-asserted-by":"publisher","first-page":"2344","DOI":"10.1109\/TVT.2013.2241093","volume":"62","author":"Y Chen","year":"2013","unstructured":"Chen, Y., Shi, R., Long, M.: Performance analysis of amplify-and-forward relaying with correlated links. IEEE Trans. Veh. Technol. 62(5), 2344\u20132349 (2013)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"28_CR11","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TCOMM.2012.032012.110430","volume":"60","author":"DS Michalopoulos","year":"2012","unstructured":"Michalopoulos, D.S., Suraweera, H.A., Karagiannidis, G.K., et al.: Amplify-and-forward relay selection with outdated channel estimates. IEEE Trans. Commun. 60(5), 1278\u20131290 (2012)","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"28_CR12","doi-asserted-by":"publisher","first-page":"2642","DOI":"10.1109\/TWC.2015.2506574","volume":"15","author":"W Jiang","year":"2016","unstructured":"Jiang, W., Kaiser, T., Vinck, A.J.H.: A robust opportunistic relaying strategy for co-operative wireless communications. IEEE Trans. Wirel. Commun. 15(4), 2642\u20132655 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"11","key":"28_CR13","doi-asserted-by":"publisher","first-page":"1948","DOI":"10.1109\/TCOMM.2004.836596","volume":"52","author":"Y Chen","year":"2004","unstructured":"Chen, Y., Tellambura, C.: Distribution functions of selection combiner output in equally correlated Rayleigh, Rician, and Nakagami-m fading channels. IEEE Trans. Commun. 52(11), 1948\u20131956 (2004)","journal-title":"IEEE Trans. Commun."},{"key":"28_CR14","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1007\/s11036-017-0965-z","volume":"23","author":"D Xu","year":"2017","unstructured":"Xu, D., Ren, P., Du, Q., Sun, L., et al.: Design in power-domain NOMA: eavesdropping suppression in the two-user relay network with compensation for the relay user. Mob. Netw. Appl. 23, 1068\u20131079 (2017)","journal-title":"Mob. Netw. Appl."},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Xu, D., Ren, P., Du, Q., Sun, L., et al.: Combat eavesdropping by full-duplex technology and signal transformation in non-orthogonal multiple access transmission. In: IEEE International Conference on Communications, pp. 1\u20136 (2017)","DOI":"10.1109\/ICC.2017.7997115"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Lang, F., Deng, Z., Wang, B.: Secure communication of correlated sources over broadcast channels. In: IEEE Information Theory Workshop, pp. 416\u2013420 (2014)","DOI":"10.1109\/ITW.2014.6970865"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Sun, X., Wang, J., Xu, W., Zhao, C.: Performance of secure communications over correlated fading channels. 19(8), 479\u2013482 (2012)","DOI":"10.1109\/LSP.2012.2203302"},{"issue":"4","key":"28_CR18","first-page":"841","volume":"38","author":"D Wang","year":"2016","unstructured":"Wang, D., Li, Y., Bai, B., et al.: Green communications based on physical-layer security for amplify-and-forward relay networks. J. Electron. Inf. Technol. 38(4), 841\u2013847 (2016)","journal-title":"J. Electron. Inf. Technol."},{"key":"28_CR19","volume-title":"Discrete Mathematics for Computer Science","author":"KP Bogart","year":"2006","unstructured":"Bogart, K.P., Stein, C., Drysdale, R.: Discrete Mathematics for Computer Science. Thomson Brooks\/Cole, Pacific Grove (2006)"},{"issue":"3","key":"28_CR20","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TIFS.2015.2390136","volume":"10","author":"G Chen","year":"2015","unstructured":"Chen, G., Gong, Y., Xiao, P., et al.: Physical layer network security in the full-duplex relay system. IEEE Trans. Inf. Forensics Secur. 10(3), 574\u2013583 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Communications in Computer and Information Science","Digital TV and Multimedia Communication"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-8138-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:46:18Z","timestamp":1558399578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-8138-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811381379","9789811381386"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-8138-6_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFTC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Forum on Digital TV and Wireless Multimedia Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iftc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.siga.com.cn\/iftc2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}