{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:18:27Z","timestamp":1761581907875,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Science and Technology Major Project of China","award":["2018ZX03001026-002"],"award-info":[{"award-number":["2018ZX03001026-002"]}]},{"name":"Doctoral Candidate Innovative Talent Project of  CQUPT","award":["BYJS201807"],"award-info":[{"award-number":["BYJS201807"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11235-019-00642-z","type":"journal-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T08:03:46Z","timestamp":1576829026000},"page":"55-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure transmission scheme for SWIPT-powered full-duplex relay system with multi-antenna based on energy cooperation and cooperative jamming"],"prefix":"10.1007","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8748-1008","authenticated-orcid":false,"given":"Meng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianhong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yun","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,20]]},"reference":[{"issue":"11","key":"642_CR1","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/MCOM.2014.6957150","volume":"52","author":"I Krikidis","year":"2014","unstructured":"Krikidis, I., Timotheou, S., & Nikolaou, S. G. (2014). Simultaneous wireless information and power transfer in modern communication systems. IEEE Communications Magazine,52(11), 104\u2013110.","journal-title":"IEEE Communications Magazine"},{"issue":"7","key":"642_CR2","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.3390\/s17071573","volume":"17","author":"C Del-Valle-Soto","year":"2017","unstructured":"Del-Valle-Soto, C., Mex-Perera, C., Monroy, R., & Nolazco-Flores, J. A. (2017). MPH-M, AODV-M and DSR-M performance evaluation under jamming attacks. Sensors,17(7), 1573.","journal-title":"Sensors"},{"issue":"5","key":"642_CR3","doi-asserted-by":"publisher","first-page":"1989","DOI":"10.1109\/TWC.2013.031813.120224","volume":"12","author":"R Zhang","year":"2013","unstructured":"Zhang, R., & Ho, C. K. (2013). MIMO broadcasting for simultaneous wireless information and power transfer. IEEE Transactions on Wireless Communications,12(5), 1989\u20132001.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"642_CR4","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1109\/COMST.2016.2633387","volume":"19","author":"XM Chen","year":"2017","unstructured":"Chen, X. M., Ng, D. W. K., Gerstacker, W. H., & Chen, H. H. (2017). A survey on multiple-antenna techniques for physical layer security. IEEE Communications Surveys & Tutorials.,19(2), 1027\u20131053.","journal-title":"IEEE Communications Surveys & Tutorials."},{"issue":"4","key":"642_CR5","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/JSAC.2018.2825560","volume":"36","author":"YP Wu","year":"2018","unstructured":"Wu, Y. P., Khisti, A., Xiao, C. S., & Caire, G. (2018). A survey of physical layer security techniques for 5G wireless networks and challenges ahead. IEEE Journal on Selected Areas in Communications,36(4), 679\u2013695.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"642_CR6","doi-asserted-by":"publisher","first-page":"1878","DOI":"10.1109\/COMST.2018.2883144","volume":"21","author":"D Wang","year":"2019","unstructured":"Wang, D., Bai, B., Zhao, W. B., & Han, H. (2019). A survey of optimization approaches for wireless physical layer security. IEEE Communications Surveys & Tutorials,21(2), 1878\u20131911.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2018","key":"642_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.aeue.2018.05.031","volume":"93","author":"S Kumar","year":"2018","unstructured":"Kumar, S., Kaur, M., Singh, N. K., Singh, K., & Chauhan, P. S. (2018). Energy detection based spectrum sensing for gamma shadowed \u03b1\u2009\u2212\u2009\u03b7\u2009\u2212\u2009\u03bc and fading channels. AEU-International Journal of Electronics and Communications,93(2018), 26\u201331.","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"2018","key":"642_CR8","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.aeue.2018.10.027","volume":"97","author":"S Kumar","year":"2018","unstructured":"Kumar, S., Chauhan, P. S., Raghuwanshi, P., & Kaur, M. (2018). ED performance over \u03b1\u2009\u2212\u2009\u03b7\u2009\u2212\u2009\u03bc\/IG and \u03b1\u2009\u2212\u2009\u03ba\u2212\u2009\u03bc\/IG generalized fading channels with diversity reception and cooperative sensing: A unified approach. AEU-International Journal of Electronics and Communications,97(2018), 273\u2013279.","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"642_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3569","author":"TR Rasethuntsa","year":"2019","unstructured":"Rasethuntsa, T. R., & Kumar, S. (2019). An integrated performance evaluation of ED-based spectrum sensing over \u03b1 \u2212\u03ba  \u2212 \u03bc and \u03b1 \u2212 \u03ba  \u2212 \u03bc-extreme fading channels. Transactions on Emerging Telecommunications Technologies. https:\/\/doi.org\/10.1002\/ett.3569.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"1","key":"642_CR10","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1080\/00051144.2017.1372124","volume":"58","author":"HS Nguyen","year":"2017","unstructured":"Nguyen, H. S., Do, D. T., & Nguyen, T. S. (2017). Exploiting hybrid time switching-based and power splitting-based relaying protocol in wireless powered communication networks with outdated channel state information. Automatika,58(1), 111\u2013118.","journal-title":"Automatika"},{"issue":"2","key":"642_CR11","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s11235-015-0085-7","volume":"62","author":"DT Do","year":"2016","unstructured":"Do, D. T. (2016). Energy-aware two-way relaying networks under imperfect hardware: optimal throughput design and analysis. Telecommunication Systems,62(2), 449\u2013459.","journal-title":"Telecommunication Systems"},{"issue":"8","key":"642_CR12","doi-asserted-by":"publisher","first-page":"7341","DOI":"10.1109\/TVT.2018.2833446","volume":"67","author":"XL Liu","year":"2018","unstructured":"Liu, X. L., Li, Z., & Wang, C. (2018). Secure decode-and-forward relay SWIPT systems with power splitting schemes. IEEE Transactions on Vehicular Technology,67(8), 7341\u20137354.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"7","key":"642_CR13","doi-asserted-by":"publisher","first-page":"5853","DOI":"10.1109\/TVT.2016.2633380","volume":"66","author":"QZ Li","year":"2017","unstructured":"Li, Q. Z., & Qin, J. Y. (2017). Joint source and relay secure beamforming for nonregenerative MIMO relay systems with wireless information and power transfer. IEEE Transactions on Vehicular Technology,66(7), 5853\u20135865.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"642_CR14","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.1109\/TVT.2016.2578313","volume":"66","author":"YH Feng","year":"2017","unstructured":"Feng, Y. H., Yang, Z., & Zhu, W. P. (2017). Robust cooperative secure beamforming for simultaneous wireless information and power transfer in amplify-and-forward relay networks. IEEE Transactions on Vehicular Technology,66(3), 2354\u20132366.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"7","key":"642_CR15","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1049\/iet-com.2015.0482","volume":"10","author":"GC Zhang","year":"2016","unstructured":"Zhang, G. C., Li, X. Y., Cui, M., Li, G. P., & Yang, L. (2016). Signal and artificial noise beamforming for secure simultaneous wireless information and power transfer multiple-input multiple-output relaying systems. IET Communications,10(7), 796\u2013804.","journal-title":"IET Communications"},{"key":"642_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-01924-1","author":"S Ghosh","year":"2019","unstructured":"Ghosh, S., Acharya, T., & Maity, P. S. (2019). On outage minimization in RF energy harvesting relay assisted bidirectional communication. Wireless Networks. https:\/\/doi.org\/10.1007\/s11276-018-01924-1.","journal-title":"Wireless Networks"},{"issue":"7","key":"642_CR17","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1109\/TCOMM.2016.2573829","volume":"64","author":"A Salem","year":"2016","unstructured":"Salem, A., Hamdi, K. A., & Rabie, K. M. (2016). Physical layer security with RF energy harvesting in AF multi-antenna relaying networks. IEEE Transactions on Communications,64(7), 3025\u20133038.","journal-title":"IEEE Transactions on Communications"},{"issue":"11","key":"642_CR18","doi-asserted-by":"publisher","first-page":"6425","DOI":"10.1109\/TWC.2015.2453418","volume":"4","author":"Y Gu","year":"2015","unstructured":"Gu, Y., & Aissa, S. (2015). RF-based energy harvesting in decode-and-forward relaying systems: Ergodic and outage capacities. IEEE Transactions on Wireless Communications,4(11), 6425\u20136434.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"642_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3233","author":"S Ghosh","year":"2017","unstructured":"Ghosh, S., Acharya, T., & Maity, S. P. (2017). Outage analysis in two-way communication with RF energy harvesting relay and co-channel interference. Transactions on Emerging Telecommunications Technologies. https:\/\/doi.org\/10.1002\/ett.3233.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"3","key":"642_CR20","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1049\/iet-com.2016.0355","volume":"11","author":"L Lv","year":"2017","unstructured":"Lv, L., Chen, J., & Yang, L. (2017). Improving physical layer security in untrusted relay networks: cooperative jamming and power allocation. IET Communications,11(3), 393\u2013399.","journal-title":"IET Communications"},{"issue":"1","key":"642_CR21","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TSP.2014.2369001","volume":"63","author":"Q Li","year":"2015","unstructured":"Li, Q., Yang, Y., & Ma, W. K. (2015). Robust cooperative beamforming and artificial noise design for physical-layer security in AF multi-antenna multi-relay networks. IEEE Transactions on Signal Processing,63(1), 206\u2013220.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"642_CR22","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1186\/s13638-017-0936-x","volume":"2017","author":"XX Nguyen","year":"2017","unstructured":"Nguyen, X. X., & Do, D. T. (2017). Optimal power allocation and throughput performance of full-duplex DF relaying networks with wireless power transfer-aware channel. EURASIP Journal on Wireless Communications and Networking,2017, 152. https:\/\/doi.org\/10.1186\/s13638-017-0936-x.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"3","key":"642_CR23","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1109\/TIFS.2015.2390136","volume":"10","author":"G Chen","year":"2015","unstructured":"Chen, G., Gong, Y., & Xiao, P. (2015). Physical layer network security in the full-duplex relay system. IEEE Transaction on Information Forensics and Security,10(3), 574\u2013583.","journal-title":"IEEE Transaction on Information Forensics and Security"},{"issue":"1","key":"642_CR24","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/TWC.2015.2472527","volume":"15","author":"FC Zhu","year":"2016","unstructured":"Zhu, F. C., Gao, F. F., & Zhang, T. (2016). Physical-layer security for full-duplex communications with self-interference mitigation. IEEE Transactions on Wireless Communications,15(1), 329\u2013340.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"642_CR25","unstructured":"Tang, X. X., Yang, W. D., & Cai, Y. M. (2017). Security of full-duplex jamming SWIPT system with multiple non-colluding eavesdroppers. In 2017 7th IEEE international conference on electronics information and emergency communication (ICEIEC), pp. 66\u201369."},{"issue":"2","key":"642_CR26","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1002\/nla.1811","volume":"20","author":"S Noschese","year":"2013","unstructured":"Noschese, S., Pasquini, L., & Reichel, L. (2013). Tridiagonal toeplitz matrices: Properties and novel applications. Numerical Linear Algebra with Applications,20(2), 302\u2013326.","journal-title":"Numerical Linear Algebra with Applications"},{"issue":"3","key":"642_CR27","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TIFS.2018.2859593","volume":"14","author":"Z Mobini","year":"2019","unstructured":"Mobini, Z., & Mohammadi, M. (2019). Wireless-powered full-duplex relay and friendly jamming for secure cooperative communications. IEEE Transactions on Information Forensics and Security,14(3), 621\u2013634.","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-019-00642-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-019-00642-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-019-00642-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,19]],"date-time":"2020-12-19T00:59:47Z","timestamp":1608339587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-019-00642-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["642"],"URL":"https:\/\/doi.org\/10.1007\/s11235-019-00642-z","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"20 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}