{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:36:57Z","timestamp":1761745017821},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T00:00:00Z","timestamp":1562630400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T00:00:00Z","timestamp":1562630400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Fundamental Research Funds for the Center University","award":["HIT. MKSTISP. 2016 13"],"award-info":[{"award-number":["HIT. MKSTISP. 2016 13"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10776-019-00442-x","type":"journal-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T17:02:47Z","timestamp":1562691767000},"page":"201-211","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Joint Relay Selection and Destination Assisted Cooperative Jamming with Power Allocation for Secure DF Relay Network"],"prefix":"10.1007","volume":"26","author":[{"given":"Shaobo","family":"Jia","sequence":"first","affiliation":[]},{"given":"Jiayan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Honglin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Ruoyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,9]]},"reference":[{"issue":"8","key":"442_CR1","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"A. D. Wyner, The wire-tap channel, Bell System Technical Journal, Vol. 54, No. 8, pp. 1355\u20131387, 1975.","journal-title":"Bell System Technical Journal"},{"issue":"4","key":"442_CR2","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S Leung-yan-cheong","year":"1978","unstructured":"S. Leung-yan-cheong and M. E. Hellman, The Gaussian wire-tap channel, IEEE Transactions on Information Theory, Vol. 24, No. 4, pp. 451\u2013456, 1978.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"6","key":"442_CR3","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y Liang","year":"2008","unstructured":"Y. Liang, H. V. Poor and S. Shamai, Secure communication over fading channels, IEEE Transactions on Information Theory, Vol. 54, No. 6, pp. 2470\u20132492, 2008.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"442_CR4","doi-asserted-by":"publisher","first-page":"4687","DOI":"10.1109\/TIT.2008.928990","volume":"54","author":"PK Gopala","year":"2008","unstructured":"P. K. Gopala, L. Lai and H. E. Gamal, On the secrecy capacity of fading channels, IEEE Transactions on Information Theory, Vol. 54, No. 10, pp. 4687\u20134698, 2008.","journal-title":"IEEE Transactions on Information Theory"},{"key":"442_CR5","doi-asserted-by":"crossref","unstructured":"Shafiee S., Ulukus S., 2007. Achievable rates in Gaussian MISO channels with secrecy constraints. Proceeding of IEEE ISIT, Nice, France: IEEE Press, 2466\u20132470.","DOI":"10.1109\/ISIT.2007.4557589"},{"issue":"4","key":"442_CR6","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1109\/TVT.2013.2285244","volume":"63","author":"K Cumanan","year":"2014","unstructured":"K. Cumanan, Z. Ding, B. Sharif, et al., Secrecy rate optimizations for a MIMO secrecy Channel with a multiple-antenna eavesdropper, IEEE Transactions on Vehicular Technology, Vol. 63, No. 4, pp. 1678\u20131690, 2014.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"442_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1109\/LSP.2015.2504396","volume":"23","author":"LX Li","year":"2016","unstructured":"L. X. Li, Z. Chen, D. Zhang, et al., A full-duplex Bob in the MIMO Gaussion wiretap channel: scheme and performance, IEEE Signal Processing Letters, Vol. 23, No. 1, pp. 107\u2013111, 2016.","journal-title":"IEEE Signal Processing Letters"},{"issue":"4","key":"442_CR8","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1631\/FITEE.1500430","volume":"18","author":"H Zhao","year":"2016","unstructured":"H. Zhao, Y. Tan, G. Pan and Y. Chen, Ergodic secrecy capacity of MRC\/SC in SIMO wiretap systems with imperfect CSI, Frontiers of Information Technology & Electronic Engineering., Vol. 18, No. 4, pp. 578\u2013590, 2016.","journal-title":"Frontiers of Information Technology & Electronic Engineering."},{"issue":"2","key":"442_CR9","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1109\/TIFS.2011.2181946","volume":"7","author":"S Gerbracht","year":"2012","unstructured":"S. Gerbracht, C. Scheunert and E. A. Jorswieck, Secrecy outage in MISO systems with partial channel information, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, pp. 704\u2013716, 2012.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"442_CR10","unstructured":"Lun, D., Zhu, H., Petropulu, A.P., et al., 2009. Amplify-and-forward based cooperation for secure wireless communications. Proceeding of IEEE International Conference Acoustics Speech Signal Processing, Taipei, Taiwan, 2613\u20132616."},{"issue":"7","key":"442_CR11","doi-asserted-by":"publisher","first-page":"3532","DOI":"10.1109\/TSP.2012.2191543","volume":"60","author":"HM Wang","year":"2012","unstructured":"H. M. Wang, Q. Yin and X. G. Xia, Distributed beamforming for physical-layer security of two-way relay networks, IEEE Transactions on Signal Processing, Vol. 60, No. 7, pp. 3532\u20133545, 2012.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"3","key":"442_CR12","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"D Lun","year":"2010","unstructured":"D. Lun, H. Zhu, A. P. Petropulu, et al., Improving wireless physical layer security via cooperating relays, IEEE Transactions on Signal Processing, Vol. 58, No. 3, pp. 1875\u20131888, 2010.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"1","key":"442_CR13","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/LSP.2012.2227313","volume":"20","author":"Y Yang","year":"2013","unstructured":"Y. Yang, Q. Li, W. K. Ma, P. C. Ching, et al., Cooperative secure beamforming for AF relay networks with multiple eavesdroppers, IEEE Signal Processing Letters, Vol. 20, No. 1, pp. 35\u201338, 2013.","journal-title":"IEEE Signal Processing Letters"},{"issue":"10","key":"442_CR14","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1109\/JSAC.2013.131011","volume":"31","author":"YL Zou","year":"2013","unstructured":"Y. L. Zou, X. B. Wang and W. Shen, Optimal relay selection for physical-layer security in cooperative wireless networks, IEEE Journal on Selected Areas in Communications, Vol. 31, No. 10, pp. 2099\u20132111, 2013.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"442_CR15","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TWC.2014.2354635","volume":"14","author":"C Wang","year":"2015","unstructured":"C. Wang, H. Wang and X. G. Xia, Hybrid opportunistic relaying and jamming with power allocation for secure cooperative networks, IEEE Transactions on Wireless Communications, Vol. 14, No. 2, pp. 589\u2013605, 2015.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"442_CR16","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"Zheng Gan","year":"2011","unstructured":"Zheng Gan, L. C. Choo and K. K. Wong, Optimal cooperative jamming to enhance physical layer security using relays, IEEE Transactions on Signal Processing, Vol. 59, No. 3, pp. 1317\u20131322, 2011.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"2","key":"442_CR17","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/TIFS.2011.2111370","volume":"6","author":"JP Vilela","year":"2011","unstructured":"J. P. Vilela, M. Bloch, J. Barros and S. W. Mclaughlin, Wireless secrecy regions with friendly jamming, IEEE ransactions on Information Forensics and Security, Vol. 6, No. 2, pp. 256\u2013266, 2011.","journal-title":"IEEE ransactions on Information Forensics and Security"},{"issue":"7","key":"442_CR18","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TIFS.2013.2261060","volume":"8","author":"S Luo","year":"2013","unstructured":"S. Luo, L. I. Jiang-yuan and A. P. Petropulu, Uncoordinated cooperative jamming for secret communications, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 7, pp. 1081\u20131090, 2013.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"8","key":"442_CR19","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1109\/LCOMM.2013.062113.131012","volume":"17","author":"M Lin","year":"2013","unstructured":"M. Lin, J. Ge and Y. Yang, An effective secure transmission scheme for AF relay networks with two-hop information leakage, IEEE Communications Letters, Vol. 17, No. 8, pp. 1676\u20131679, 2013.","journal-title":"IEEE Communications Letters"},{"key":"442_CR20","doi-asserted-by":"crossref","unstructured":"Vishwakarma, S., Chockalingam, A., 2013. Amplify-and-forward relay beamforming for secrecy with cooperative jamming and imperfect CSI. Proceeding of IEEE International Conference on Communications, Budapest, Hungary, 3047\u20133052.","DOI":"10.1109\/ICC.2013.6655008"},{"issue":"1","key":"442_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/LSP.2012.2227725","volume":"20","author":"HM Wang","year":"2013","unstructured":"H. M. Wang, M. Luo, X. G. Xia and Q. Yin, Joint cooperative beamforming and jamming to secure AF relay systems with individual power constraint and no eavesdropper\u2019s CSI, IEEE Signal Processing Letters, Vol. 20, No. 1, pp. 39\u201342, 2013.","journal-title":"IEEE Signal Processing Letters"},{"issue":"8","key":"442_CR22","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/LSP.2014.2387860","volume":"22","author":"H Hui","year":"2015","unstructured":"H. Hui, A. L. Swindlehurst, G. Li and J. Liang, Secure relay and jammer selection for physical layer security, IEEE Signal Processing Letters, Vol. 22, No. 8, pp. 1147\u20131151, 2015.","journal-title":"IEEE Signal Processing Letters"},{"issue":"1","key":"442_CR23","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/TIFS.2011.2166386","volume":"7","author":"JC Chen","year":"2012","unstructured":"J. C. Chen, R. Q. Zhang, L. Y. Song, Z. Han, et al., Joint relay and jammer selection for secure two-way relay networks, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 1, pp. 310\u2013320, 2012.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"10","key":"442_CR24","doi-asserted-by":"publisher","first-page":"4985","DOI":"10.1109\/TSP.2011.2159598","volume":"59","author":"JY Li","year":"2011","unstructured":"J. Y. Li, A. P. Petropulu and S. Weber, On cooperative relaying schemes for wireless physical layer security, IEEE Transactions on Signal Processing, Vol. 59, No. 10, pp. 4985\u20134997, 2011.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"9","key":"442_CR25","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/JSAC.2013.130908","volume":"31","author":"KH Park","year":"2013","unstructured":"K. H. Park, T. Wang and M. S. Alouini, On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming, IEEE Journal on Selected Areas in Communications, Vol. 31, No. 9, pp. 1741\u20131750, 2013.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"442_CR26","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1109\/TIFS.2013.2248730","volume":"8","author":"Y Liu","year":"2013","unstructured":"Y. Liu, J. Li and A. P. Petropulu, Destination assisted cooperative jamming for wireless physical-layer security, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 4, pp. 682\u2013694, 2013.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"10","key":"442_CR27","doi-asserted-by":"publisher","first-page":"4893","DOI":"10.1109\/TVT.2014.2370754","volume":"64","author":"HM Wang","year":"2015","unstructured":"H. M. Wang, F. Liu and M. C. Yang, Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems, IEEE Transactions on Vehicular Technology, Vol. 64, No. 10, pp. 4893\u20134898, 2015.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"442_CR28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213","volume-title":"Fundamentals of wireless communication","author":"D Tse","year":"2005","unstructured":"D. Tse and P. Viswanath, Fundamentals of wireless communication, Cambridge Univ. PressCambridge, 2005."},{"issue":"4","key":"442_CR29","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/29.17526","volume":"37","author":"B Friedlander","year":"1989","unstructured":"B. Friedlander and B. Porat, Performance analysis of a null-steering algorithm based on direction of arrival estimation, IEEE Transactions on Acoustics, Speech, and Signal Processing, Vol. 37, No. 4, pp. 461\u2013466, 1989.","journal-title":"IEEE Transactions on Acoustics, Speech, and Signal Processing"},{"key":"442_CR30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex optimization","author":"S Boyd","year":"2004","unstructured":"S. Boyd and L. Vandenberghe, Convex optimization, Cambridge Univ. PressCambridge, 2004."}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00442-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-019-00442-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00442-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T23:12:59Z","timestamp":1594163579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-019-00442-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,9]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["442"],"URL":"https:\/\/doi.org\/10.1007\/s10776-019-00442-x","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,9]]},"assertion":[{"value":"4 April 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}