{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:44:16Z","timestamp":1740123856242,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2020MF001","ZR2022MF273","ZR2020MF010"],"award-info":[{"award-number":["ZR2020MF001","ZR2022MF273","ZR2020MF010"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015642","name":"Project of Shandong Province Higher Educational Science and Technology Program","doi-asserted-by":"publisher","award":["J18KA315"],"award-info":[{"award-number":["J18KA315"]}],"id":[{"id":"10.13039\/501100015642","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11276-023-03632-x","type":"journal-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T14:02:48Z","timestamp":1705500168000},"page":"1925-1937","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure 5G downlink NOMA cognitive relay network: joint the impact of imperfect spectrum sensing and outdated CSI"],"prefix":"10.1007","volume":"30","author":[{"given":"Min","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xinjie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Enyu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xuhu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,17]]},"reference":[{"issue":"3","key":"3632_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MVT.2006.307294","volume":"1","author":"P Wang","year":"2006","unstructured":"Wang, P., Xiao, J., & Li, P. (2006). Comparison of orthogonal and non-orthogonal approaches to future wireless cellular systems. IEEE Vehicular Technology Magazine, 1(3), 4\u201311.","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"3632_CR2","doi-asserted-by":"crossref","unstructured":"Saito, Y., Benjebbour, A., Kishiyama, Y., & Nakamura, T. (2013). System-level performance evaluation of downlink non-orthogonal multiple access (NOMA). In 2013 IEEE 24th Annual international symposium on personal, indoor, and mobile radio communications (PIMRC). pp. 611\u2013615.","DOI":"10.1109\/PIMRC.2013.6666209"},{"issue":"9","key":"3632_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2015.7263349","volume":"53","author":"L Dai","year":"2015","unstructured":"Dai, L., Wang, B., Yuan, Y., Han, S., Chih-Lin, I., & Wang, Z. (2015). Non-orthogonal multiple access for 5g: solutions, challenges, opportunities, and future research trends. IEEE Communications Magazine, 53(9), 74\u201381.","journal-title":"IEEE Communications Magazine"},{"issue":"2","key":"3632_CR4","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MWC.2005.1421925","volume":"12","author":"JG Andrews","year":"2005","unstructured":"Andrews, J. G. (2005). Interference cancellation for cellular systems: A contemporary overview. IEEE Wireless Communications Magazine, 12(2), 19\u201329.","journal-title":"IEEE Wireless Communications Magazine"},{"issue":"12","key":"3632_CR5","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1109\/LSP.2014.2343971","volume":"21","author":"Z Ding","year":"2014","unstructured":"Ding, Z., Yang, Z., Fan, P., & Poor, H. V. (2014). On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users. IEEE Signal Processing Letters, 21(12), 1501\u20131505.","journal-title":"IEEE Signal Processing Letters"},{"issue":"8","key":"3632_CR6","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1109\/LCOMM.2015.2441064","volume":"19","author":"Z Ding","year":"2015","unstructured":"Ding, Z., Peng, M., & Poor, H. V. (2015). Cooperative non-orthogonal multiple access in 5G systems. IEEE Communications Letters, 19(8), 1462\u20131465.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"3632_CR7","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TWC.2019.2947670","volume":"19","author":"X Li","year":"2020","unstructured":"Li, X., Li, J., Liu, Y., Ding, Z., & Nallanathan, A. (2020). Residual transceiver hardware impairments on cooperative NOMA networks. IEEE Transactions on Wireless Communications, 19(1), 680\u2013695.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"3632_CR8","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s11276-018-1851-8","volume":"26","author":"TA Le","year":"2020","unstructured":"Le, T. A., & Kong, H. Y. (2020). Performance analysis of downlink nomaCEH relaying network in the presence of residual transmit rf hardware impairments. Wireless Networks, 26, 1045\u20131055.","journal-title":"Wireless Networks"},{"issue":"1","key":"3632_CR11","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/JSYST.2016.2514601","volume":"12","author":"B Zhong","year":"2018","unstructured":"Zhong, B., & Zhang, Z. (2018). Opportunistic two-way full-duplex relay selection in underlay cognitive networks. IEEE Systems Journal, 12(1), 725\u2013734.","journal-title":"IEEE Systems Journal"},{"issue":"7","key":"3632_CR12","first-page":"4727","volume":"16","author":"Q Li","year":"2017","unstructured":"Li, Q., & Varshney, P. K. (2017). Resource allocation and outage analysis for an adaptive cognitive two-way relay network. IEEE Transactions on Communications, 16(7), 4727\u20134737.","journal-title":"IEEE Transactions on Communications"},{"issue":"12","key":"3632_CR13","doi-asserted-by":"publisher","first-page":"5306","DOI":"10.1109\/T-WC.2008.070890","volume":"7","author":"LB Le","year":"2008","unstructured":"Le, L. B., & Hossain, E. (2008). Resource allocation for spectrum underlay in cognitive radio networks. IEEE Transactions on Wireless Communications, 7(12), 5306\u20135315.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"3632_CR14","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s11277-015-3037-3","volume":"87","author":"X Wang","year":"2016","unstructured":"Wang, X., Li, E., Ha, D. B., Hoang, T., & Zhang, H. (2016). Secure cognitive relay network: Joint the impact of imperfect spectrum sensing and outdated feedback. Wireless Personal Communications, 87, 165\u2013192.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"3632_CR15","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/MCOM.2018.1700687","volume":"56","author":"L Lv","year":"2018","unstructured":"Lv, L., Chen, J., Ni, Q., Ding, Z., & Jiang, H. (2018). Cognitive non-orthogonal multiple access with cooperative relaying: a new wireless frontier for 5G spectrum sharing. IEEE Communications Magazine, 56(4), 188\u2013195.","journal-title":"IEEE Communications Magazine"},{"key":"3632_CR16","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wu, Y., Zhou, F., Wu, Y., & Wang, Y. (2017). Multi-objective resource allocation in NOMA cognitive radios based on a practical non-linear energy harvesting model. In: 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), pp. 1\u20136.","DOI":"10.1109\/WCSP.2017.8171122"},{"issue":"7","key":"3632_CR17","doi-asserted-by":"publisher","first-page":"6700","DOI":"10.1109\/TVT.2018.2811733","volume":"67","author":"L Lv","year":"2018","unstructured":"Lv, L., Ding, Z., Ni, Q., & Chen, J. (2018). Secure MISO-NOMA transmission with artificial noise. IEEE Transactions on Vehicular Technology, 67(7), 6700\u20136705.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"8","key":"3632_CR18","doi-asserted-by":"publisher","first-page":"7603","DOI":"10.1109\/TVT.2019.2920144","volume":"68","author":"N Zhao","year":"2019","unstructured":"Zhao, N., Li, D., Liu, M., Cao, Y., & Wang, X. (2019). Secure transmission via joint precoding optimization for downlink MISO NOMA. IEEE Transactions on Vehicular Technology, 68(8), 7603\u20137615.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"3632_CR19","doi-asserted-by":"publisher","first-page":"2294","DOI":"10.1109\/TCOMM.2018.2883079","volume":"67","author":"N Zhao","year":"2019","unstructured":"Zhao, N., Wang, W., Wang, J., Chen, Y., Lin, Y., & Ding, Z. (2019). Joint beamforming and jamming optimization for secure transmission in MISO-NOMA networks. IEEE Transactions on Communications, 67(3), 2294\u20132305.","journal-title":"IEEE Transactions on Communications"},{"issue":"4","key":"3632_CR9","doi-asserted-by":"publisher","first-page":"2723","DOI":"10.1109\/TCOMM.2021.3050503","volume":"69","author":"X Li","year":"2021","unstructured":"Li, X., Zhao, M., Zeng, M., Mumtaz, S., Menon, V., Ding, Z., & Dobre, O. (2021). Hardware impaired ambient backscatter NOMA system: Reliability and security. IEEE Transactions on Communications, 69(4), 2723\u20132736.","journal-title":"IEEE Transactions on Communications"},{"issue":"4","key":"3632_CR10","doi-asserted-by":"publisher","first-page":"2288","DOI":"10.1109\/TCOMM.2023.3245659","volume":"71","author":"X Li","year":"2023","unstructured":"Li, X., Wang, Q., Zeng, M., Liu, Y., Dang, S., Tsiftsis, T., & Dobre, O. (2023). Physical-layer authentication for ambient backscatter aided NOMA symbiotic systems. IEEE Transactions on Communications, 71(4), 2288\u20132303.","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"3632_CR20","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MNET.2013.6523805","volume":"27","author":"Z Shu","year":"2013","unstructured":"Shu, Z., & Qian, Y. (2013). On physical layer security for cognitive radio networks. IEEE Network, 27(3), 28\u201333.","journal-title":"IEEE Network"},{"issue":"1","key":"3632_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-6180-2013-169","volume":"2013","author":"J Zhu","year":"2013","unstructured":"Zhu, J. (2013). Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack. Eurasip Journal on Advances in Signal Processing, 2013(1), 1\u201310.","journal-title":"Eurasip Journal on Advances in Signal Processing"},{"issue":"12","key":"3632_CR22","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1177\/15501477211059097","volume":"17","author":"Z Shang","year":"2021","unstructured":"Shang, Z., Zhang, T., Tao, L., Xiang, Z., & Yang, W. (2021). Physical layer security in cognitive noma sensor networks with full-duplex technique. International Journal of Distributed Sensor Networks, 17(12), 331\u2013342.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"3","key":"3632_CR23","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1109\/JSTSP.2019.2902103","volume":"17","author":"Z Xiang","year":"2019","unstructured":"Xiang, Z., Yang, W., Pan, G., Cai, Y., & Song, Y. (2019). Physical layer security in cognitive radio inspired noma network. IEEE Journal of Selected Topics in Signal Processing, 17(3), 700\u2013714.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"3632_CR25","doi-asserted-by":"publisher","first-page":"51189","DOI":"10.1109\/ACCESS.2020.2980171","volume":"8","author":"X Li","year":"2020","unstructured":"Li, X., Zhao, M., Gao, X. C., Li, L., Do, D. T., Rabie, K. M., et al. (2020). Physical layer security of cooperative noma for IoT networks under I\/Q imbalance. IEEE Access, 8, 51189\u201351199.","journal-title":"IEEE Access"},{"issue":"5","key":"3632_CR26","doi-asserted-by":"publisher","first-page":"2881","DOI":"10.1109\/TNSE.2022.3180632","volume":"10","author":"S Tang","year":"2022","unstructured":"Tang, S., & Chen, L. (2022). Computational intelligence and deep learning for next generation edge-enabled industrial IoT. IEEE Transactions Network Science Engineering, 10(5), 2881\u20132893.","journal-title":"IEEE Transactions Network Science Engineering"},{"issue":"8","key":"3632_CR27","doi-asserted-by":"publisher","first-page":"4014","DOI":"10.1109\/TVT.2011.2167166","volume":"60","author":"H Chen","year":"2011","unstructured":"Chen, H., Liu, J., Dong, Z., Zhou, Y., & Guo, W. (2011). Exact capacity analysis of partial relay selection under outdated csi over rayleigh fading channels. IEEE Transactions on Vehicular Technology, 60(8), 4014\u20134018.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"3632_CR28","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TCOMM.2014.2377239","volume":"63","author":"Y Zou","year":"2014","unstructured":"Zou, Y., Champagne, B., Zhu, W. P., & Hanzo, L. (2014). Relay-selection improves the security-reliability trade-off in cognitive radio systems. IEEE Transactions on Communications, 63(1), 215\u2013228.","journal-title":"IEEE Transactions on Communications"},{"issue":"101586","key":"3632_CR24","first-page":"1","volume":"52","author":"X Wang","year":"2021","unstructured":"Wang, X., Li, E., & Yang, G. (2021). Performance analysis of 5G downlink cooperative NOMA network with multi-antenna relay. Physical Communication, 52(101586), 1\u201310.","journal-title":"Physical Communication"},{"key":"3632_CR29","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1109\/TIFS.2023.3324394","volume":"19","author":"C Liu","year":"2024","unstructured":"Liu, C., Fu, X., Wang, Y., Guo, L., Liu, Y., Lin, Y., Zhao, H., & Gui, G. (2024). Overcoming data limitations: a few-shot specific emitter identification method using self-supervised learning and adversarial augmentation. IEEE Transactions Information. Forensics Security, 19, 500\u2013513.","journal-title":"IEEE Transactions Information. Forensics Security"},{"issue":"1","key":"3632_CR30","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TCCN.2020.3024610","volume":"7","author":"Y Lin","year":"2020","unstructured":"Lin, Y., Tu, Y., Dou, Z., Chen, L., & Mao, S. (2020). Contour stella image and deep learning for signal recognition in the physical layer. IEEE Transactions on Cognitive Communications and Networking, 7(1), 34\u201346.","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"issue":"10","key":"3632_CR31","doi-asserted-by":"publisher","first-page":"2657","DOI":"10.1109\/LCOMM.2023.3312669","volume":"27","author":"Z Yao","year":"2023","unstructured":"Yao, Z., Fu, X., Guo, L., Wang, Y., Lin, Y., Shi, S., & Gui, G. (2023). Few-shot specific emitter identification using asymmetric masked auto-encoder. IEEE Communications Letters, 27(10), 2657\u20132661.","journal-title":"IEEE Communications Letters"},{"issue":"10","key":"3632_CR32","doi-asserted-by":"publisher","first-page":"11216","DOI":"10.1109\/TVT.2022.3183596","volume":"71","author":"S Tang","year":"2022","unstructured":"Tang, S., Xia, J., Fan, L., Lei, X., Xu, W., & Nallanathan, A. (2022). Dilated convolution based CSI feedback compression for massive MIMO systems. IEEE Transcations Vehicular Technology, 71(10), 11216\u201311221.","journal-title":"IEEE Transcations Vehicular Technology"},{"key":"3632_CR33","doi-asserted-by":"crossref","unstructured":"He, L., Fan, L., Lei, X., Tang, X., Fan, P., & Nallanathan, A. (2023). Learning-based MIMO detection with dynamic spatial modulation. In IEEE Transactions on cognitive communications and networking, early access, pp. 1\u201312.","DOI":"10.1109\/TCCN.2023.3306853"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03632-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03632-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03632-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,18]],"date-time":"2024-05-18T07:17:06Z","timestamp":1716016626000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03632-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,17]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["3632"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03632-x","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2024,1,17]]},"assertion":[{"value":"12 December 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}